cornerpirate / JS2PDFInjectorLinks
Inject a JS file into a PDF file.
☆364Updated 5 years ago
Alternatives and similar repositories for JS2PDFInjector
Users that are interested in JS2PDFInjector are comparing it to the libraries listed below
Sorting:
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆227Updated 3 years ago
 - several list of simple and obfuscate PHP shell☆183Updated 3 years ago
 - NodeJS Red-Team Cheat Sheet☆220Updated 6 years ago
 - ☆242Updated 5 years ago
 - Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆265Updated last month
 - Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆172Updated 5 years ago
 - OpenSSH 2.3 < 7.7 - Username Enumeration☆42Updated 2 years ago
 - Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆109Updated last year
 - ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆360Updated last year
 - This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆254Updated last year
 - Herramienta para evadir disable_functions y open_basedir☆463Updated 2 years ago
 - PDF Files for Pentesting☆656Updated last year
 - Local file inclusion exploitation tool☆902Updated last month
 - A Security Tool for Enumerating WebSockets☆362Updated 3 years ago
 - JSshell - JavaScript reverse/remote shell☆626Updated 2 years ago
 - Linux PAM Backdoor☆352Updated last year
 - Damn Vulnerable Thick Client App developed in C# .NET☆163Updated 2 years ago
 - Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
 - ☆524Updated 2 years ago
 - SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆156Updated last year
 - brute-forcing su for fun and possibly profit☆98Updated 6 years ago
 - Subdomain finder☆370Updated last year
 - IPFuscator - A tool to automatically generate alternative IP representations☆394Updated last year
 - Phar + JPG Polyglot generator and playground (CTF CODE)☆94Updated 6 years ago
 - HTTP Request Smuggling Detection Tool☆528Updated last year
 - This Python script can be used to bypass IP source restrictions using HTTP headers.☆396Updated last month
 - Injects php payloads into jpeg images☆539Updated 4 years ago
 - A library for detecting known secrets across many web frameworks☆719Updated 2 weeks ago
 - project-blacklist3r☆592Updated last month
 - ☆163Updated 3 years ago