jonaslejon / malicious-pdfLinks
π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β3,485Updated 3 months ago
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- Rockyou for web fuzzingβ2,905Updated last month
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,920Updated 2 years ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,584Updated this week
- Quickly discover exposed hosts on the internet using multiple search engines.β2,711Updated this week
- An XSS exploitation command-line interface and payload generator.β1,397Updated 8 months ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huβ¦β2,254Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,792Updated last month
- Contextual Content Discovery Toolβ2,961Updated last year
- Real-world infosec wordlists, updated regularlyβ1,569Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,288Updated last year
- A collection of awesome one-liner scripts especially for bug bounty tips.β2,933Updated last year
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial β¦β1,418Updated 4 years ago
- β1,780Updated 4 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,344Updated 8 months ago
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information aboβ¦β1,667Updated 2 months ago
- Tools & Interesting Things for RedTeam Opsβ2,222Updated 3 months ago
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,600Updated 7 months ago
- A simple script just made for self use for bypassing 403β1,976Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,812Updated last year
- The fastest dork scanner written in Go.β1,259Updated last year
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript filesβ2,273Updated last year
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.β4,584Updated 9 months ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entβ¦β2,002Updated 10 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,156Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,465Updated 3 years ago
- bypass-url-parserβ1,093Updated last week
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. π‘οΈβοΈπ§β1,796Updated last year
- An OOB interaction gathering server and client libraryβ3,969Updated last week
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.β2,438Updated last year
- Arsenal is just a quick inventory and launcher for hacking programsβ3,577Updated 10 months ago