jonaslejon / malicious-pdfLinks
π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β3,550Updated 3 weeks ago
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,963Updated this week
- Rockyou for web fuzzingβ2,964Updated 3 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,311Updated last year
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. π‘οΈβοΈπ§β1,809Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huβ¦β2,279Updated last year
- Contextual Content Discovery Toolβ3,035Updated last year
- Tools & Interesting Things for RedTeam Opsβ2,235Updated 5 months ago
- β1,802Updated last month
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,809Updated 3 weeks ago
- A collection of awesome one-liner scripts especially for bug bounty tips.β2,983Updated last year
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,725Updated this week
- Collection of methodology and test case for various web vulnerabilities.β6,892Updated 5 months ago
- Real-world infosec wordlists, updated regularlyβ1,595Updated this week
- Arsenal is just a quick inventory and launcher for hacking programsβ3,621Updated last year
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,319Updated last month
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial β¦β1,451Updated 4 years ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ4,416Updated last week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,931Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,877Updated last month
- β2,341Updated 2 years ago
- Offensive Software Exploitation Courseβ2,389Updated 2 years ago
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information aboβ¦β1,689Updated 4 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Sβ¦β2,850Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.ioβ3,142Updated 7 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.β2,756Updated this week
- Pentest Report Generatorβ2,691Updated this week
- An XSS exploitation command-line interface and payload generator.β1,402Updated 10 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,178Updated 2 months ago
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!β2,152Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokensβ¦β4,782Updated 10 months ago