Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code on the computer system for user exploitation.
☆231Feb 24, 2022Updated 4 years ago
Alternatives and similar repositories for MalwareAnalysis-in-PDF
Users that are interested in MalwareAnalysis-in-PDF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PDFExaminer Tool - Analyse PDF Malware☆64Aug 12, 2021Updated 4 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- Simple shellcode obfuscator using PYTHON and C / C++☆74Jun 17, 2020Updated 5 years ago
- Bypassing AWS WAF using a single ';'☆40Aug 1, 2018Updated 7 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- ☆16Jun 21, 2024Updated last year
- Understanding and analyzing carrier files workshop repo☆51Dec 4, 2019Updated 6 years ago
- An isolated environment for DNS cache poisoning attack investigation and demonstration.☆10Nov 22, 2020Updated 5 years ago
- Please no pull requests for this repository. Thanks!☆2,430Mar 16, 2026Updated 2 weeks ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- ☆16Mar 22, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,636Nov 14, 2025Updated 4 months ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,715Mar 21, 2026Updated last week
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Command-line tool to identify useragents that bypasses proxy restrictions☆13Oct 23, 2025Updated 5 months ago
- Random notes collected on the intertubes relating to DFIR☆36Jun 26, 2023Updated 2 years ago
- Windows tray app to paste a password after scanning a fingerprint☆14Dec 8, 2022Updated 3 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Malware dynamic instrumentation tool based on frida framework☆111Jun 7, 2020Updated 5 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- Powerful Python tool to analyze PDF documents☆1,437Aug 19, 2024Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆147Nov 27, 2025Updated 4 months ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Aug 10, 2021Updated 4 years ago
- PowerShell scripts for communicating with a remote host.☆302Apr 27, 2023Updated 2 years ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 6 months ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 11 months ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Feb 7, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆65Jun 5, 2021Updated 4 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- Patching AmsiOpenSession by forcing an error branching☆154Aug 2, 2023Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Aug 2, 2023Updated 2 years ago
- ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit☆48Oct 14, 2021Updated 4 years ago
- ☆13Aug 17, 2020Updated 5 years ago