RUB-NDS / PDF101
Artifacts for the Black Hat talk.
☆103Updated 4 years ago
Alternatives and similar repositories for PDF101:
Users that are interested in PDF101 are comparing it to the libraries listed below
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆140Updated last year
- ncurses-grep: interactively navigate grep-like results☆32Updated 10 months ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆101Updated last year
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆159Updated 3 months ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆215Updated 3 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 2 years ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- Find the remote website version based on a git repository☆125Updated 3 years ago
- Valhalla API Client☆64Updated 2 years ago
- ☆68Updated 3 years ago
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆126Updated 7 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆224Updated 4 years ago
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human society☆119Updated 2 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆200Updated last year
- Search for vulnerabilities and exposures while filtering based on age, keywords, and other parameters.☆123Updated 2 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆64Updated 5 years ago
- ☆65Updated 6 years ago
- ☆149Updated last year
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆38Updated 2 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- Code Review Audit Script Scanner☆140Updated last year
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- Application and Service Fingerprinting☆131Updated 2 years ago
- Use normal web pentest tools to hack Websockets☆18Updated 5 years ago
- Test a host for susceptibility to CVE-2019-19781☆107Updated 4 years ago
- Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.☆19Updated 3 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆244Updated 2 weeks ago
- Ultimate File Transfer List☆62Updated 2 years ago