This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240.
☆69Jun 6, 2021Updated 4 years ago
Alternatives and similar repositories for Embedded-PDF
Users that are interested in Embedded-PDF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hey guys Beef Tool on termux easily install and use Without 'Root'☆12Dec 11, 2023Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Recon Automation☆11Sep 14, 2024Updated last year
- ☆224Jun 27, 2023Updated 2 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆25Mar 8, 2026Updated last month
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39)☆20Apr 30, 2025Updated 11 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- PowerShell script to generate ShellCode in various formats☆46Sep 25, 2024Updated last year
- ☆13Sep 7, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆15Oct 18, 2024Updated last year
- A keylogger program built on Python . It will send emails after recording keys.☆12May 5, 2024Updated last year
- Trillium's - Master the art Of Necessary cybersecurity skills (T-MON)☆14Mar 27, 2024Updated 2 years ago
- The cracked panel of redline stealer☆12Jul 8, 2022Updated 3 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 4 months ago
- WordPress File Upload RCE Exploit☆16Sep 1, 2025Updated 7 months ago
- ☆57Jun 12, 2025Updated 9 months ago
- Android gallery spyware☆12Feb 7, 2023Updated 3 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆16Jan 2, 2024Updated 2 years ago
- ☆10Jan 9, 2026Updated 3 months ago
- ☆18Jun 28, 2020Updated 5 years ago
- Code in the Book!☆11Oct 15, 2018Updated 7 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Feb 6, 2019Updated 7 years ago
- ☆36May 31, 2023Updated 2 years ago
- A comprehensive all-in-one Python-based Proof of Concept script to discover and exploit a critical authentication bypass vulnerability (C…☆12May 26, 2025Updated 10 months ago
- PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/☆25May 1, 2024Updated last year
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆27Jul 30, 2021Updated 4 years ago
- Create a http server in your pc to access files from any other devices under same Wi-Fi!☆19Mar 18, 2024Updated 2 years ago
- ☆14Dec 5, 2024Updated last year
- A critical severity Remote Code Execution (RCE) vulnerability (CVE-2023-22527) was discovered in Confluence Server and Data Center.☆22Jan 23, 2024Updated 2 years ago
- Best Tools For DDoS☆12Apr 19, 2024Updated last year
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- A list of OSINT tools that may be useful to you when conducting investigations related to Russian Federation☆66Aug 8, 2025Updated 8 months ago