jonaslejon / malicious-pdfLinks
π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β3,560Updated last month
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- Rockyou for web fuzzingβ2,975Updated 4 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7,012Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,314Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huβ¦β2,285Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.β2,768Updated 3 weeks ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,749Updated this week
- An OOB interaction gathering server and client libraryβ4,088Updated last week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,882Updated last month
- Generates millions of keyword-based password mutations in seconds.β1,396Updated 6 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. π‘οΈβοΈπ§β1,811Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,931Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,381Updated 11 months ago
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial β¦β1,463Updated 4 years ago
- Pentest Report Generatorβ2,714Updated 3 weeks ago
- Contextual Content Discovery Toolβ3,050Updated last year
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.β1,451Updated 9 months ago
- A collection of awesome one-liner scripts especially for bug bounty tips.β3,042Updated last year
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.β2,466Updated last year
- An XSS exploitation command-line interface and payload generator.β1,404Updated 11 months ago
- Tools & Interesting Things for RedTeam Opsβ2,243Updated 6 months ago
- β1,812Updated last month
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,836Updated last month
- β2,350Updated 2 years ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probingβ2,945Updated last year
- Awesome Pentest Tools Collectionβ1,475Updated 4 months ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.β3,116Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.β5,983Updated last year
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,621Updated last week
- Real-world infosec wordlists, updated regularlyβ1,603Updated this week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,133Updated last month