Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code on the computer system for user exploitation.
☆229Feb 24, 2022Updated 4 years ago
Alternatives and similar repositories for MalwareAnalysis-in-PDF
Users that are interested in MalwareAnalysis-in-PDF are comparing it to the libraries listed below
Sorting:
- The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings…☆19Dec 23, 2020Updated 5 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,607Nov 14, 2025Updated 3 months ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- ☆16Jun 21, 2024Updated last year
- ☆12Feb 8, 2021Updated 5 years ago
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆11Feb 14, 2023Updated 3 years ago
- License Key Generator and Validation written in C# .NET☆12Feb 28, 2023Updated 3 years ago
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- ☆16Mar 22, 2023Updated 2 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Windows tray app to paste a password after scanning a fingerprint☆14Dec 8, 2022Updated 3 years ago
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- Public API client for GETTR, a "non-bias [sic] social network," designed for data archival and analysis.☆13Jun 21, 2022Updated 3 years ago
- ☆11Feb 8, 2026Updated last month
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,633Mar 1, 2026Updated last week
- Reconnaissance and Enumeration automation script☆53Mar 16, 2021Updated 4 years ago
- Please no pull requests for this repository. Thanks!☆2,418Feb 19, 2026Updated 2 weeks ago
- ☆106May 15, 2023Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Sep 18, 2024Updated last year
- Capture. Detonate. Collect☆14Sep 20, 2024Updated last year
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 4 years ago
- A Torrent Magnet Link Scrapper☆14Dec 4, 2019Updated 6 years ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆16Feb 6, 2021Updated 5 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆232Oct 4, 2020Updated 5 years ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆41Aug 23, 2024Updated last year
- scscanner is tool to read website status code response from the lists.☆39May 27, 2023Updated 2 years ago
- Digital Forensics date and time☆23Dec 22, 2025Updated 2 months ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- Eddie Vetter - triage macOS applications for security research☆16May 24, 2021Updated 4 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago