This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240.
☆70Jun 6, 2021Updated 4 years ago
Alternatives and similar repositories for Embedded-PDF
Users that are interested in Embedded-PDF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hey guys Beef Tool on termux easily install and use Without 'Root'☆12Dec 11, 2023Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆12Jun 6, 2023Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆14Dec 14, 2023Updated 2 years ago
- bot net ufonet con ia☆12Jul 7, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated 2 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- ☆225Jun 27, 2023Updated 2 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆27Mar 8, 2026Updated 2 months ago
- Mailer is python3 script use for sending spear-phishing to target email...It was created by Spider Anongreyhat☆29Apr 18, 2022Updated 4 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- PowerShell script to generate ShellCode in various formats☆46Sep 25, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆15Oct 18, 2024Updated last year
- A keylogger program built on Python . It will send emails after recording keys.☆12May 5, 2024Updated 2 years ago
- This is Web Application Penetration Testing Report made for everybody who wanted a glance of how to make a professional report for pentet…☆18Sep 3, 2021Updated 4 years ago
- FUD Android Payload and Listener☆19Jul 3, 2018Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- ☆10Apr 30, 2026Updated 3 weeks ago
- The cracked panel of redline stealer☆13Jul 8, 2022Updated 3 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Feb 6, 2019Updated 7 years ago
- linux based ransomware builder tool that can create a fully offline windows ransomware executable.☆31Apr 27, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A comprehensive all-in-one Python-based Proof of Concept script to discover and exploit a critical authentication bypass vulnerability (C…☆11May 26, 2025Updated 11 months ago
- PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/☆25May 1, 2024Updated 2 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Fellow web hacker 👻☆68Oct 29, 2023Updated 2 years ago
- ☆18Dec 6, 2020Updated 5 years ago
- SSLPinDetect is a tool for analyzing Android APKs to detect SSL pinning implementations by scanning for known patterns in decompiled code…☆83Sep 5, 2025Updated 8 months ago
- ☆27Jul 30, 2021Updated 4 years ago
- Create a http server in your pc to access files from any other devices under same Wi-Fi!☆19Mar 18, 2024Updated 2 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆14Dec 5, 2024Updated last year
- A critical severity Remote Code Execution (RCE) vulnerability (CVE-2023-22527) was discovered in Confluence Server and Data Center.☆22Jan 23, 2024Updated 2 years ago
- Best Tools For DDoS☆12Apr 19, 2024Updated 2 years ago
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve☆16Jul 16, 2022Updated 3 years ago
- CVEs and Techniques used PDF as an attack vector.☆111Jul 5, 2022Updated 3 years ago
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692☆46Mar 24, 2025Updated last year