cornerpirate / JS2PDFInjectorLinks
Inject a JS file into a PDF file.
☆378Updated 6 years ago
Alternatives and similar repositories for JS2PDFInjector
Users that are interested in JS2PDFInjector are comparing it to the libraries listed below
Sorting:
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆228Updated 3 years ago
- several list of simple and obfuscate PHP shell☆191Updated 3 years ago
- PDF Files for Pentesting☆692Updated last year
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆173Updated 6 years ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆257Updated last year
- OpenSSH 2.3 < 7.7 - Username Enumeration☆43Updated 2 years ago
- Herramienta para evadir disable_functions y open_basedir☆487Updated 2 years ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆163Updated last year
- PHP 8.1.0-dev Backdoor System Shell Script☆94Updated 4 years ago
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆406Updated last year
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆111Updated last year
- NodeJS Red-Team Cheat Sheet☆225Updated 6 years ago
- JSshell - JavaScript reverse/remote shell☆631Updated 3 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆209Updated last year
- ☆151Updated 2 months ago
- IPFuscator - A tool to automatically generate alternative IP representations☆400Updated 2 years ago
- A tool to inspect and attack version 1 GUIDs☆239Updated 3 years ago
- A Security Tool for Enumerating WebSockets☆365Updated 4 years ago
- ☆523Updated 2 years ago
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆270Updated 4 months ago
- Damn Vulnerable Thick Client App developed in C# .NET☆173Updated 2 years ago
- Subdomain finder☆372Updated last year
- project-blacklist3r☆631Updated 4 months ago
- Local File Inclusion discovery and exploitation tool☆333Updated last year
- Root shell PoC for CVE-2021-3156☆71Updated 5 years ago
- A script that you can run in the background!☆184Updated 6 years ago
- Some notes about Hydra for bruteforcing☆189Updated 5 years ago
- brute-forcing su for fun and possibly profit☆99Updated 6 years ago
- ☆165Updated 3 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆143Updated 6 years ago