NorthernXploit / pdf-exploitLinks
POC Pdf-exploit builder on C#
☆13Updated last year
Alternatives and similar repositories for pdf-exploit
Users that are interested in pdf-exploit are comparing it to the libraries listed below
Sorting:
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆65Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆57Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆27Updated last week
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆72Updated 5 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆122Updated 7 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆65Updated 9 months ago
- ☆118Updated last year
- ☆48Updated last year
- an exploit of Server-side request forgery (SSRF)☆50Updated 11 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 11 months ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆13Updated last month
- ☆38Updated 3 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 2 weeks ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 10 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 7 months ago
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆65Updated 5 months ago
- ☆24Updated last year
- Host Header Vulnerability Scanner Automated Tool☆23Updated 3 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- CrlfiX☆19Updated 5 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated 2 years ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆32Updated 5 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆33Updated last year
- Grep subdomains from web pages.☆42Updated 5 months ago
- ☆66Updated last month
- A tool for inspecting and analyzing mobile application storage files.☆45Updated 2 months ago