This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240.
☆69Jun 6, 2021Updated 4 years ago
Alternatives and similar repositories for Embedded-PDF
Users that are interested in Embedded-PDF are comparing it to the libraries listed below
Sorting:
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- bot net ufonet con ia☆12Jul 7, 2024Updated last year
- Recon Automation☆11Sep 14, 2024Updated last year
- A python tool for generating strong password☆11Nov 28, 2022Updated 3 years ago
- ☆221Jun 27, 2023Updated 2 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆24Mar 8, 2026Updated 2 weeks ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- PowerShell script to generate ShellCode in various formats☆45Sep 25, 2024Updated last year
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆15Oct 18, 2024Updated last year
- A keylogger program built on Python . It will send emails after recording keys.☆12May 5, 2024Updated last year
- Trillium's - Master the art Of Necessary cybersecurity skills (T-MON)☆14Mar 27, 2024Updated last year
- This is Web Application Penetration Testing Report made for everybody who wanted a glance of how to make a professional report for pentet…☆18Sep 3, 2021Updated 4 years ago
- The cracked panel of redline stealer☆12Jul 8, 2022Updated 3 years ago
- FUD Android Payload and Listener☆20Jul 3, 2018Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 4 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆95Apr 27, 2025Updated 10 months ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- Code in the Book!☆11Oct 15, 2018Updated 7 years ago
- Xarus SS - this is free server side executor.☆11Sep 3, 2021Updated 4 years ago
- ☆35May 31, 2023Updated 2 years ago
- A comprehensive all-in-one Python-based Proof of Concept script to discover and exploit a critical authentication bypass vulnerability (C…☆12May 26, 2025Updated 9 months ago
- linux based ransomware builder tool that can create a fully offline windows ransomware executable.☆30Jan 10, 2026Updated 2 months ago
- SSLPinDetect is a tool for analyzing Android APKs to detect SSL pinning implementations by scanning for known patterns in decompiled code…☆82Sep 5, 2025Updated 6 months ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- ☆11Oct 30, 2025Updated 4 months ago
- ☆27Jul 30, 2021Updated 4 years ago
- Crack Everything for CrackMapExec version 6☆22Jul 1, 2024Updated last year
- Create a http server in your pc to access files from any other devices under same Wi-Fi!☆19Mar 18, 2024Updated 2 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- Monke click. Cube appear. Monke happy.☆19Dec 28, 2023Updated 2 years ago
- CVEs and Techniques used PDF as an attack vector.☆111Jul 5, 2022Updated 3 years ago
- A list of OSINT tools that may be useful to you when conducting investigations related to Russian Federation☆62Aug 8, 2025Updated 7 months ago
- These hacks are for you to cheat on scholarly websites, like Blooket, Kahoot, and more.☆24Apr 21, 2022Updated 3 years ago
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692☆45Mar 24, 2025Updated 11 months ago
- Secure Hacker - Admin Panel Detector☆19Mar 26, 2018Updated 7 years ago