cogent / origami-pdfLinks
Origami is a Ruby framework designed to parse, analyze, and forge PDF documents.
☆50Updated 12 years ago
Alternatives and similar repositories for origami-pdf
Users that are interested in origami-pdf are comparing it to the libraries listed below
Sorting:
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆52Updated 3 years ago
- Phishing e-mail repository☆36Updated 5 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Updated 12 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- Rogue AP killer☆91Updated 7 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- ☆84Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Updated 10 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- VOIP Security Audit Framework☆109Updated 7 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- ☆63Updated 10 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Updated 5 years ago
- Leak File Analyzer☆62Updated 8 years ago
- Passive recon / OSINT automation script☆39Updated 7 years ago