π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β3,637Nov 14, 2025Updated 4 months ago
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7,383Mar 25, 2026Updated 2 weeks ago
- An OOB interaction gathering server and client libraryβ4,263Mar 30, 2026Updated last week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,159Mar 8, 2026Updated last month
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,918Updated this week
- ScareCrow - Payload creation framework designed around EDR bypass.β2,882Aug 18, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β6,554Jan 18, 2026Updated 2 months ago
- Rockyou for web fuzzingβ3,108Mar 11, 2026Updated 3 weeks ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,436Jan 19, 2025Updated last year
- Automation for internal Windows Penetrationtest / AD-Securityβ3,654Aug 28, 2025Updated 7 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.β6,144Aug 14, 2024Updated last year
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,451Mar 28, 2026Updated last week
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formβ¦β1,126Jun 10, 2024Updated last year
- Collection of methodology and test case for various web vulnerabilities.β7,067Jun 25, 2025Updated 9 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.β2,055Jul 12, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!β2,576Mar 8, 2026Updated 3 weeks ago
- Adversary Emulation Frameworkβ10,958Updated this week
- All about bug bounty (bypasses, payloads, and etc)β6,685Sep 8, 2023Updated 2 years ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probingβ3,040Mar 7, 2026Updated last month
- Privilege Escalation Enumeration Script for Windowsβ3,790Mar 28, 2026Updated last week
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ6,463May 1, 2025Updated 11 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,220Jan 5, 2026Updated 3 months ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.β4,879Mar 20, 2026Updated 2 weeks ago
- Contextual Content Discovery Toolβ3,132Apr 29, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Eβ¦β8,539Mar 21, 2026Updated 2 weeks ago
- β1,676Apr 14, 2025Updated 11 months ago
- evilginx3 + gophishβ1,976Jun 15, 2024Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,944Oct 7, 2023Updated 2 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )β2,773Feb 27, 2026Updated last month
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)β1,501Dec 21, 2023Updated 2 years ago
- A fast, simple, recursive content discovery tool written in Rust.β7,633Feb 8, 2026Updated 2 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the defaultβ¦β1,637Aug 6, 2022Updated 3 years ago
- "Can I take over XYZ?" β a list of services and how to claim (sub)domains with dangling DNS records.β5,613Feb 8, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This map lists the essential techniques to bypass anti-virus and EDRβ3,181Mar 28, 2025Updated last year
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secretsβ1,538Mar 8, 2026Updated 3 weeks ago
- HTTP parameter discovery suite.β6,169Feb 20, 2025Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applicationsβ1,336Aug 7, 2025Updated 8 months ago
- Notes about attacking Jenkins serversβ2,092Jul 10, 2024Updated last year
- Hidden parameters discovery suiteβ2,039Sep 8, 2024Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScriptβ1,808May 22, 2024Updated last year