NorthernXploit / pdf-exploitLinks
POC Pdf-exploit builder on C#
☆13Updated last year
Alternatives and similar repositories for pdf-exploit
Users that are interested in pdf-exploit are comparing it to the libraries listed below
Sorting:
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆66Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆27Updated 3 weeks ago
- ☆48Updated last year
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆56Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 8 months ago
- An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open R…☆70Updated this week
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- ☆53Updated 8 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated 10 months ago
- an exploit of Server-side request forgery (SSRF)☆48Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆73Updated last month
- ☆122Updated 2 weeks ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 9 months ago
- Grep subdomains from web pages.☆43Updated 6 months ago
- Automatic tool to find Google Dorks☆36Updated 10 months ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated 11 months ago
- ☆27Updated last year
- Khonsu is a powerful port scanning tool written in python that detect open ports with concurrent and accurately☆15Updated last week
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆49Updated 2 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- This repository contains the best fuzzing wordlist files☆34Updated 9 months ago
- ☆40Updated last year
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆45Updated 5 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 2 months ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆104Updated 11 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36Updated 2 years ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆91Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆46Updated 2 months ago