jonaslejon / malicious-pdfLinks
π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β3,581Updated 2 months ago
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7,060Updated this week
- Rockyou for web fuzzingβ2,988Updated 4 months ago
- Contextual Content Discovery Toolβ3,058Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,935Updated 2 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. π‘οΈβοΈπ§β1,814Updated last year
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial β¦β1,470Updated 4 years ago
- β1,820Updated this week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,860Updated 2 months ago
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!β2,212Updated last year
- β2,355Updated 2 years ago
- Real-world infosec wordlists, updated regularlyβ1,611Updated this week
- Tools & Interesting Things for RedTeam Opsβ2,243Updated 7 months ago
- An OOB interaction gathering server and client libraryβ4,121Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,331Updated last year
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information aboβ¦β1,694Updated 6 months ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huβ¦β2,299Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,891Updated 2 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.β6,000Updated last year
- Pentest Report Generatorβ2,728Updated this week
- A collection of awesome one-liner scripts especially for bug bounty tips.β3,056Updated last year
- All about bug bounty (bypasses, payloads, and etc)β6,569Updated 2 years ago
- Mind-Maps of Several Thingsβ2,620Updated 2 years ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript filesβ2,358Updated last year
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,782Updated this week
- Quickly discover exposed hosts on the internet using multiple search engines.β2,773Updated last week
- An XSS exploitation command-line interface and payload generator.β1,408Updated 11 months ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.β3,125Updated 2 years ago
- The fastest dork scanner written in Go.β1,268Updated last year
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.β4,768Updated last year
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.β2,477Updated last year