Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.
☆111Feb 28, 2023Updated 3 years ago
Alternatives and similar repositories for booby-trap-pdf
Users that are interested in booby-trap-pdf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Domain-Recon Automated Tool.☆15Feb 8, 2023Updated 3 years ago
- A bash script that can scan a target host or a list of target hosts looking for open/closed ports using netcat or telnet.☆14Feb 11, 2023Updated 3 years ago
- One of the few OSINT tools non-USA focused, designed to retrieve and verify data for Mexican citizens in the OSINT investigations context…☆13Mar 12, 2023Updated 3 years ago
- One of the few OSINT tools focused on Mexican citizens, retrieve and verify data about a Security Social Number aka IMSS from a given CU…☆14Apr 6, 2023Updated 2 years ago
- Obtain an email full profile including reputation, consistency, deliverability, social networks account linked, plus more data points.☆40Mar 22, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This tool allows you to get the approximate location of a Wi-Fi access point (AP) using the long-awaited: Wigle.net API.☆34Mar 3, 2023Updated 3 years ago
- OSINT tool to verify phone numbers in Mexico.☆20Mar 12, 2023Updated 3 years ago
- This tool allows you to get the approximate location of a Bluetooth device using the long-awaited: Wigle.net API.☆37Mar 3, 2023Updated 3 years ago
- Track Bluetooth devices and their proximity to a GPS location.☆23Apr 29, 2023Updated 2 years ago
- A bluetooth control script for all your Bluetooth devices DoS needs.☆109May 7, 2024Updated last year
- Obtain a profile from car plate, including car jacking report, verified data related to vehicles registered in the Mexican SCT..☆41May 6, 2023Updated 2 years ago
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆272Nov 25, 2023Updated 2 years ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆39Feb 3, 2025Updated last year
- Termux üçün Hacking Tool / Hacking Tool for Termux☆37Nov 20, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Jam CCTV Camera using DOS attack☆39May 27, 2024Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Nov 17, 2019Updated 6 years ago
- This tool is design for FTP brute force☆13Jan 23, 2024Updated 2 years ago
- URLHider, a powerful tool designed to make URL masking a breeze.☆33Feb 10, 2025Updated last year
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆18Jan 24, 2024Updated 2 years ago
- Generate wordlists for dictionary attacks☆34Mar 14, 2025Updated last year
- Same @Mebus/cupp tool but best speed and Creates every possible word using the information you provide.☆21Nov 30, 2025Updated 3 months ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- ☆22Jan 11, 2026Updated 2 months ago
- REST API for tgsint telegram bot☆10Nov 11, 2023Updated 2 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆81Apr 3, 2025Updated 11 months ago
- ☆15Jul 30, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- DarkStar is a Premium Hacking Tools. You can buy by contacting me☆26Oct 27, 2024Updated last year
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- CameraDar hacks its way into RTSP CCTV cameras.☆11Oct 27, 2017Updated 8 years ago
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- Demonstrate and showcasing how you can hide payload or secret message inside an image, audio, and PDF file and how an unethical person mi…☆12Jul 23, 2021Updated 4 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆12May 25, 2025Updated 10 months ago
- Phishing Framework for Facebook, Gmail, Twitter, WiFi, Windows.☆74Feb 5, 2020Updated 6 years ago