☆65May 26, 2023Updated 2 years ago
Alternatives and similar repositories for BadPDF-Generator
Users that are interested in BadPDF-Generator are comparing it to the libraries listed below
Sorting:
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- ☆78Apr 25, 2023Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆33Feb 27, 2024Updated 2 years ago
- ☆10Jul 8, 2024Updated last year
- Python 3 script to dump/scrape/extract company employees from LinkedIn API☆568Feb 12, 2026Updated 2 weeks ago
- ☆317Jul 6, 2024Updated last year
- ☆42Dec 24, 2024Updated last year
- Windows for Red Teamers☆126Apr 18, 2022Updated 3 years ago
- ☆46Nov 5, 2025Updated 3 months ago
- OWASP Foundation Web Respository☆10Oct 6, 2025Updated 4 months ago
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- Chat automates Nuclei template generation☆107Nov 10, 2023Updated 2 years ago
- repo for the ctf challenges☆14Apr 20, 2024Updated last year
- ☆13Mar 23, 2023Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- ☆89Jul 18, 2023Updated 2 years ago
- Generate FUD backdoors☆262Mar 17, 2023Updated 2 years ago
- ARP Poisoning Tool, it creates entries on target's ARP Table. The things which you need only are Destination IP and MAC address.☆48Jan 17, 2020Updated 6 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- ☆108Feb 14, 2026Updated 2 weeks ago
- ☆13Jun 14, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆155Mar 27, 2023Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆116Jul 18, 2023Updated 2 years ago
- Google Hacking using Prompt ChatGPT☆16Jun 3, 2023Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- Send phishing messages and attachments to Microsoft Teams users☆1,106Jun 19, 2024Updated last year