jodevsa / malicious-pdf-javascript
JavaScript extracted from malicious PDF files using KoalaScanner.com
☆8Updated 8 years ago
Alternatives and similar repositories for malicious-pdf-javascript
Users that are interested in malicious-pdf-javascript are comparing it to the libraries listed below
Sorting:
- HEVD exploits☆9Updated 6 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- BlackWorm SRC Extract☆16Updated 8 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- HTTP BOTNET☆8Updated 2 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Various Crypter Project☆9Updated 11 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- A repository of LIVE malwares for your own joy and pleasure☆14Updated 9 years ago
- A proof-of-concept of a small Javascript script that can send what an user do on a web page to a server.☆8Updated 10 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- A Linux Cyptomining malware☆36Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago