jonaslejon / malicious-pdf
π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β2,925Updated 3 weeks ago
Alternatives and similar repositories for malicious-pdf:
Users that are interested in malicious-pdf are comparing it to the libraries listed below
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,106Updated last week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β5,923Updated this week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,278Updated 7 months ago
- β2,185Updated last year
- Arsenal is just a quick inventory and launcher for hacking programsβ3,284Updated 2 months ago
- Rockyou for web fuzzingβ2,680Updated this week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,868Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,816Updated 2 years ago
- Quickly discover exposed hosts on the internet using multiple search engines.β2,503Updated this week
- A script that you can run in the background!β2,780Updated 5 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,099Updated 3 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β5,849Updated 3 months ago
- Contextual Content Discovery Toolβ2,720Updated 9 months ago
- Generates millions of keyword-based password mutations in seconds.β1,251Updated 5 months ago
- The ultimate WinRM shell for hacking/pentestingβ4,684Updated last month
- Wi-Fi Exploitation Frameworkβ2,455Updated 4 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.β1,328Updated last month
- An XSS exploitation command-line interface and payload generator.β1,293Updated last week
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β3,903Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,376Updated 2 years ago
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,520Updated last year
- File upload vulnerability scanner and exploitation tool.β3,163Updated last year
- All In One Web Reconβ2,346Updated 2 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,056Updated 3 months ago
- Offensive Software Exploitation Courseβ2,351Updated last year
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web applicationβ4,577Updated last month
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β4,356Updated 2 weeks ago
- A curated list of various bug bounty toolsβ4,532Updated 3 weeks ago
- Find domains and subdomains related to a given domainβ3,133Updated 7 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityβ¦β3,886Updated last week