cornerpirate / JS2PDFInjectorLinks
Inject a JS file into a PDF file.
☆362Updated 5 years ago
Alternatives and similar repositories for JS2PDFInjector
Users that are interested in JS2PDFInjector are comparing it to the libraries listed below
Sorting:
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆229Updated 3 years ago
- PDF Files for Pentesting☆639Updated 11 months ago
- Subdomain finder☆369Updated last year
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆263Updated last week
- several list of simple and obfuscate PHP shell☆180Updated 3 years ago
- A Security Tool for Enumerating WebSockets☆361Updated 3 years ago
- NodeJS Red-Team Cheat Sheet☆220Updated 6 years ago
- ☆236Updated 5 years ago
- IPFuscator - A tool to automatically generate alternative IP representations☆374Updated last year
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆108Updated last year
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆253Updated last year
- Damn Vulnerable Thick Client App developed in C# .NET☆157Updated 2 years ago
- project-blacklist3r☆583Updated 6 months ago
- ☆523Updated 2 years ago
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆355Updated last year
- A library for detecting known secrets across many web frameworks☆700Updated this week
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆389Updated 3 years ago
- Local File Inclusion discovery and exploitation tool☆324Updated 8 months ago
- HTTP Request Smuggling Detection Tool☆522Updated last year
- ☆162Updated 3 years ago
- OpenSSH 2.3 < 7.7 - Username Enumeration☆42Updated 2 years ago
- JSshell - JavaScript reverse/remote shell☆627Updated 2 years ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆151Updated last year
- Herramienta para evadir disable_functions y open_basedir☆453Updated 2 years ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆172Updated 5 years ago
- Local file inclusion exploitation tool☆887Updated 2 years ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆122Updated last year
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆512Updated 3 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆199Updated last year