POC Pdf-exploit builder on C#
☆13Mar 1, 2024Updated last year
Alternatives and similar repositories for pdf-exploit
Users that are interested in pdf-exploit are comparing it to the libraries listed below
Sorting:
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Jun 7, 2024Updated last year
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆60Jul 7, 2024Updated last year
- ☆19Dec 1, 2025Updated 2 months ago
- c99 shell , c99 shell download, c99 shell txt , c99shell☆26Jul 24, 2022Updated 3 years ago
- ☆26Jun 5, 2024Updated last year
- Payload for bug bounty☆98Jul 7, 2024Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- my own 2fa bypass methodolgy☆28Sep 22, 2023Updated 2 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Information Security Information From Web☆28Jul 31, 2025Updated 7 months ago
- bash script for automating subdomain enumeration process either passive or active☆29Updated this week
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆77May 16, 2024Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- UpAnime : Modern Search Engine API for Manga.☆10Jun 11, 2024Updated last year
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- ☆41Oct 20, 2023Updated 2 years ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆32Jan 3, 2024Updated 2 years ago
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆34Apr 27, 2020Updated 5 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆83Aug 1, 2022Updated 3 years ago
- ☆139Nov 9, 2024Updated last year
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Nov 16, 2023Updated 2 years ago
- ☆42Jul 31, 2024Updated last year
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆42Jan 29, 2025Updated last year
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago
- Zero-Day Code Injection and Persistence Technique☆35Mar 28, 2017Updated 8 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆96Aug 9, 2024Updated last year
- ☆14May 14, 2022Updated 3 years ago
- ☆11Sep 19, 2022Updated 3 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- Hide information in the wave data of .wav file by using the least significant bits☆10Jul 13, 2021Updated 4 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- ☆26Jan 19, 2026Updated last month