jonaslejon / malicious-pdf
π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β3,021Updated last week
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,218Updated 7 months ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,251Updated this week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,259Updated last week
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huβ¦β2,153Updated 10 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. π‘οΈβοΈπ§β1,757Updated 11 months ago
- An OOB interaction gathering server and client libraryβ3,751Updated last week
- Rockyou for web fuzzingβ2,793Updated 2 weeks ago
- A collection of awesome one-liner scripts especially for bug bounty tips.β2,833Updated 9 months ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.β4,342Updated 4 months ago
- Contextual Content Discovery Toolβ2,838Updated last year
- A collection of hacks and one-off scriptsβ2,279Updated 2 months ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ4,044Updated last month
- Fetch all the URLs that the Wayback Machine knows about for a domainβ3,895Updated last year
- A script that you can run in the background!β2,843Updated 9 months ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web applicationβ4,704Updated 4 months ago
- All about bug bounty (bypasses, payloads, and etc)β6,254Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokensβ¦β4,455Updated 3 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,886Updated last year
- The fastest dork scanner written in Go.β1,203Updated last year
- β1,694Updated last week
- Collection of methodology and test case for various web vulnerabilities.β6,388Updated last month
- All In One Web Reconβ2,439Updated 2 weeks ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript filesβ2,169Updated 11 months ago
- BBT - Bug Bounty Tools (examplesπ‘)β1,802Updated last year
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probingβ2,718Updated 10 months ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entβ¦β1,866Updated 5 months ago
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!β1,843Updated last year
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.β2,380Updated 9 months ago
- An XSS exploitation command-line interface and payload generator.β1,365Updated 3 months ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for β¦β3,328Updated this week