Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code on the computer system for user exploitation.
☆231Feb 24, 2022Updated 4 years ago
Alternatives and similar repositories for MalwareAnalysis-in-PDF
Users that are interested in MalwareAnalysis-in-PDF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings…☆19Dec 23, 2020Updated 5 years ago
- A TCP Backdoor made in python☆16Dec 18, 2021Updated 4 years ago
- Sample react native apps that expose OpenCV functionality on both iOS and Android☆19Jan 4, 2023Updated 3 years ago
- Some Generic Browser Exploits (For Educational Purposes Only)☆29Jan 12, 2022Updated 4 years ago
- Bypassing AWS WAF using a single ';'☆40Aug 1, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Mar 28, 2022Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- Just a simple RFID authentication key brute-force program written in python.☆40Mar 1, 2023Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆51Dec 4, 2019Updated 6 years ago
- An isolated environment for DNS cache poisoning attack investigation and demonstration.☆10Nov 22, 2020Updated 5 years ago
- Please no pull requests for this repository. Thanks!☆2,443Mar 16, 2026Updated last month
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- ☆16Mar 22, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vie…☆3,660Apr 10, 2026Updated last week
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,737Updated this week
- License Key Generator and Validation written in C# .NET☆12Feb 28, 2023Updated 3 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- A tinder clone for developers☆71Feb 1, 2023Updated 3 years ago
- Windows tray app to paste a password after scanning a fingerprint☆15Dec 8, 2022Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆31Sep 18, 2024Updated last year
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- Malware dynamic instrumentation tool based on frida framework☆111Jun 7, 2020Updated 5 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- Powerful Python tool to analyze PDF documents☆1,441Aug 19, 2024Updated last year
- PowerShell scripts for communicating with a remote host.☆302Apr 27, 2023Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆148Nov 27, 2025Updated 4 months ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 11 months ago
- ☆65Jun 5, 2021Updated 4 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Aug 2, 2023Updated 2 years ago
- ☆13Aug 17, 2020Updated 5 years ago
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- A Torrent Magnet Link Scrapper☆14Dec 4, 2019Updated 6 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆232Oct 4, 2020Updated 5 years ago
- An HTTP proxy that enables access to Tor Onion Services☆17Dec 16, 2021Updated 4 years ago