jonaslejon / malicious-pdfLinks
π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β3,070Updated last week
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- Rockyou for web fuzzingβ2,846Updated last month
- a drop-in replacement for Nmap powered by shodan.ioβ3,056Updated 2 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,910Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,248Updated 9 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Sβ¦β2,739Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.β1,382Updated 5 months ago
- Fancy reverse and bind shell handlerβ2,768Updated 11 months ago
- Pentest Report Generatorβ2,573Updated last week
- Tools & Interesting Things for RedTeam Opsβ2,209Updated 3 weeks ago
- Quickly discover exposed hosts on the internet using multiple search engines.β2,642Updated 3 weeks ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,278Updated 5 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.β5,602Updated 11 months ago
- β2,275Updated last year
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityβ¦β4,157Updated last month
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,129Updated 8 months ago
- Contextual Content Discovery Toolβ2,898Updated last year
- A script that you can run in the background!β2,869Updated 11 months ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huβ¦β2,185Updated last year
- Generates millions of keyword-based password mutations in seconds.β1,332Updated last month
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,434Updated last month
- Leaked pentesting manuals given to Conti ransomware crooksβ1,043Updated 3 years ago
- β1,744Updated last month
- Offensive Software Exploitation Courseβ2,373Updated 2 years ago
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,571Updated 4 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,588Updated last month
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,873Updated 2 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. π‘οΈβοΈπ§β1,771Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,797Updated last year
- A collection of awesome one-liner scripts especially for bug bounty tips.β2,878Updated 11 months ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 β¦β2,366Updated 7 months ago