jodevsa / malicious-pdf-javascriptLinks
JavaScript extracted from malicious PDF files using KoalaScanner.com
☆8Updated 8 years ago
Alternatives and similar repositories for malicious-pdf-javascript
Users that are interested in malicious-pdf-javascript are comparing it to the libraries listed below
Sorting:
- HEVD exploits☆9Updated 6 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- simple javascript keylogger google chrome☆8Updated 5 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 7 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- HTTP BOTNET☆8Updated 2 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 6 years ago
- BlackWorm SRC Extract☆16Updated 8 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆13Updated 7 years ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Malware USB Spread | POC | Example☆8Updated 6 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆16Updated 5 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago