cornerpirate / JS2PDFInjectorLinks
Inject a JS file into a PDF file.
☆355Updated 5 years ago
Alternatives and similar repositories for JS2PDFInjector
Users that are interested in JS2PDFInjector are comparing it to the libraries listed below
Sorting:
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆230Updated 3 years ago
- several list of simple and obfuscate PHP shell☆178Updated 2 years ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆148Updated last year
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆108Updated last year
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆352Updated 11 months ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆172Updated 5 years ago
- project-blacklist3r☆572Updated 4 months ago
- OpenSSH 2.3 < 7.7 - Username Enumeration☆42Updated last year
- ☆224Updated 5 years ago
- brute-forcing su for fun and possibly profit☆95Updated 6 years ago
- Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.☆157Updated last year
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆259Updated last year
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆250Updated last year
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆195Updated last year
- ☆160Updated 3 years ago
- Herramienta para evadir disable_functions y open_basedir☆441Updated last year
- A library for detecting known secrets across many web frameworks☆673Updated this week
- A Security Tool for Enumerating WebSockets☆360Updated 3 years ago
- PDF Files for Pentesting☆614Updated 10 months ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆395Updated 6 months ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- IPFuscator - A tool to automatically generate alternative IP representations☆373Updated last year
- ☆521Updated 2 years ago
- Subdomain finder☆368Updated last year
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆117Updated last year
- ☆104Updated last year
- JSshell - JavaScript reverse/remote shell☆628Updated 2 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆132Updated 5 years ago
- ☆120Updated 2 years ago
- NodeJS Red-Team Cheat Sheet☆220Updated 6 years ago