jonaslejon / malicious-pdf
π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β3,002Updated last month
Alternatives and similar repositories for malicious-pdf:
Users that are interested in malicious-pdf are comparing it to the libraries listed below
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,203Updated this week
- Rockyou for web fuzzingβ2,779Updated 2 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,203Updated 6 months ago
- Contextual Content Discovery Toolβ2,823Updated 11 months ago
- Tools & Interesting Things for RedTeam Opsβ2,183Updated 2 years ago
- β1,680Updated this week
- β2,239Updated last year
- A collection of awesome one-liner scripts especially for bug bounty tips.β2,823Updated 8 months ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.β2,369Updated 8 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. π‘οΈβοΈπ§β1,754Updated 10 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.β1,371Updated 3 weeks ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,424Updated 2 weeks ago
- Collection of methodology and test case for various web vulnerabilities.β6,353Updated last month
- Fancy reverse and bind shell handlerβ2,733Updated 8 months ago
- Real-world infosec wordlists, updated regularlyβ1,484Updated this week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,849Updated 2 years ago
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial β¦β1,342Updated 4 years ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huβ¦β2,141Updated 9 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Sβ¦β2,690Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,783Updated 11 months ago
- An OOB interaction gathering server and client libraryβ3,714Updated this week
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript filesβ2,154Updated 11 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,048Updated last week
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,310Updated 5 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ1,955Updated last week
- All about bug bounty (bypasses, payloads, and etc)β6,218Updated last year
- "Can I take over XYZ?" β a list of services and how to claim (sub)domains with dangling DNS records.β5,125Updated 2 months ago
- The ultimate WinRM shell for hacking/pentestingβ4,805Updated 4 months ago
- The all-in-one browser extension for offensive security professionals πβ6,042Updated 3 months ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,194Updated this week