☆65May 26, 2023Updated 2 years ago
Alternatives and similar repositories for BadPDF-Generator
Users that are interested in BadPDF-Generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆78Apr 25, 2023Updated 2 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Google Hacking using Prompt ChatGPT☆15Jun 3, 2023Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- ☆46Nov 5, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆317Jul 6, 2024Updated last year
- Chat automates Nuclei template generation☆108Nov 10, 2023Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- Python 3 script to dump/scrape/extract company employees from LinkedIn API☆575Feb 12, 2026Updated last month
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Generate FUD backdoors☆263Mar 17, 2023Updated 3 years ago
- OWASP Foundation Web Respository☆10Oct 6, 2025Updated 5 months ago
- ☆15Apr 29, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- ☆42Dec 24, 2024Updated last year
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 3 years ago
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- ☆13Mar 23, 2023Updated 3 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,113Jun 19, 2024Updated last year
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Apr 30, 2023Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Jun 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆10Jul 8, 2024Updated last year
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- Checklists for Testing Security environment☆876Mar 12, 2025Updated last year
- ARP Poisoning Tool, it creates entries on target's ARP Table. The things which you need only are Destination IP and MAC address.☆48Jan 17, 2020Updated 6 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Nov 2, 2023Updated 2 years ago
- A Windows token-theft utility that enumerates SYSTEM processes, duplicates their access token, and spawns a new process running as NT AUT…☆64Updated this week
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆116Jul 18, 2023Updated 2 years ago
- repo for the ctf challenges☆14Apr 20, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆20Dec 29, 2024Updated last year
- Educational repository with source code examples☆12Jun 3, 2025Updated 9 months ago
- ☆45Oct 19, 2021Updated 4 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆108Feb 14, 2026Updated last month
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆19Jun 27, 2022Updated 3 years ago
- Awesome AV/EDR/XDR Bypass Tips☆287Apr 23, 2023Updated 2 years ago