jonaslejon / malicious-pdfLinks
π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β3,328Updated 2 months ago
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- Rockyou for web fuzzingβ2,887Updated 2 weeks ago
- Contextual Content Discovery Toolβ2,946Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,285Updated 11 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,746Updated 2 weeks ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,523Updated last week
- β2,310Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.β2,702Updated 2 weeks ago
- Offensive Software Exploitation Courseβ2,378Updated 2 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,920Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huβ¦β2,249Updated last year
- Pentest Report Generatorβ2,622Updated 2 weeks ago
- β1,777Updated 3 months ago
- πSearches Hash APIs to crack your hash quicklyπ If hash is not found, automatically pipes into HashCatβ‘β1,380Updated 6 months ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ4,149Updated 2 weeks ago
- Tools & Interesting Things for RedTeam Opsβ2,220Updated 3 months ago
- An OOB interaction gathering server and client libraryβ3,934Updated last week
- a drop-in replacement for Nmap powered by shodan.ioβ3,103Updated 4 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Sβ¦β2,797Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,327Updated 7 months ago
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial β¦β1,397Updated 4 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.β2,932Updated last year
- Real-world infosec wordlists, updated regularlyβ1,561Updated this week
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,597Updated 6 months ago
- An XSS exploitation command-line interface and payload generator.β1,392Updated 7 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. π‘οΈβοΈπ§β1,790Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.β5,711Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,465Updated 2 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.β4,563Updated 8 months ago
- Arsenal is just a quick inventory and launcher for hacking programsβ3,558Updated 9 months ago
- Mind-Maps of Several Thingsβ2,578Updated 2 years ago