cornerpirate / JS2PDFInjectorLinks
Inject a JS file into a PDF file.
☆378Updated 6 years ago
Alternatives and similar repositories for JS2PDFInjector
Users that are interested in JS2PDFInjector are comparing it to the libraries listed below
Sorting:
- several list of simple and obfuscate PHP shell☆190Updated 3 years ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆162Updated last year
- PDF Files for Pentesting☆692Updated last year
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆229Updated 3 years ago
- ☆253Updated 5 years ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆404Updated 4 years ago
- JSshell - JavaScript reverse/remote shell☆630Updated 3 years ago
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆403Updated last year
- Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.☆163Updated 2 years ago
- OpenSSH 2.3 < 7.7 - Username Enumeration☆43Updated 2 years ago
- NodeJS Red-Team Cheat Sheet☆225Updated 6 years ago
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆270Updated 4 months ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆208Updated last year
- PHP 8.1.0-dev Backdoor System Shell Script☆94Updated 4 years ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆256Updated last year
- A Security Tool for Enumerating WebSockets☆364Updated 4 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆172Updated 2 years ago
- ☆165Updated 3 years ago
- IPFuscator - A tool to automatically generate alternative IP representations☆400Updated 2 years ago
- SSTI Payload Generator☆92Updated 3 years ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆173Updated 6 years ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆400Updated 4 months ago
- ☆523Updated 2 years ago
- brute-forcing su for fun and possibly profit☆99Updated 6 years ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆95Updated 7 years ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆125Updated 2 years ago
- Local file inclusion exploitation tool☆917Updated 4 months ago
- A library for detecting known secrets across many web frameworks☆762Updated 2 weeks ago
- Linux PAM Backdoor☆363Updated 2 years ago
- Local File Inclusion discovery and exploitation tool☆332Updated last year