jonaslejon / malicious-pdfLinks
π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β3,100Updated last month
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- Contextual Content Discovery Toolβ2,936Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.β2,694Updated last month
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,319Updated 7 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,920Updated last year
- Rockyou for web fuzzingβ2,875Updated this week
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,592Updated 5 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,282Updated 11 months ago
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!β2,014Updated last year
- An OOB interaction gathering server and client libraryβ3,911Updated this week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,688Updated 2 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,140Updated 10 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,461Updated 2 years ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,495Updated this week
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.β4,529Updated 7 months ago
- An XSS exploitation command-line interface and payload generator.β1,389Updated 7 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.β1,417Updated 5 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,546Updated 2 months ago
- Arsenal is just a quick inventory and launcher for hacking programsβ3,544Updated 9 months ago
- Generates millions of keyword-based password mutations in seconds.β1,337Updated 2 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,656Updated 3 months ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript filesβ2,245Updated last year
- Tools & Interesting Things for RedTeam Opsβ2,217Updated 2 months ago
- β1,770Updated 2 months ago
- β2,302Updated last year
- Pentest Report Generatorβ2,615Updated this week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityβ¦β4,189Updated 3 months ago
- Real-world infosec wordlists, updated regularlyβ1,554Updated this week
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. π‘οΈβοΈπ§β1,784Updated last year
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probingβ2,848Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huβ¦β2,215Updated last year