jonaslejon / malicious-pdfLinks
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
☆3,545Updated this week
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆6,904Updated last week
- Rockyou for web fuzzing☆2,945Updated 2 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,929Updated 2 years ago
- Contextual Content Discovery Tool☆3,019Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,732Updated last month
- Pentest Report Generator☆2,679Updated last week
- An XSS exploitation command-line interface and payload generator.☆1,400Updated 9 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,609Updated 11 months ago
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,687Updated this week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,607Updated 8 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,361Updated 9 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,265Updated 5 months ago
- a drop-in replacement for Nmap powered by shodan.io☆3,131Updated 6 months ago
- Tools & Interesting Things for RedTeam Ops☆2,235Updated 4 months ago
- An OOB interaction gathering server and client library☆4,023Updated last week
- Generates millions of keyword-based password mutations in seconds.☆1,375Updated 5 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,307Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,789Updated 5 months ago
- Real-world infosec wordlists, updated regularly☆1,591Updated this week
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,113Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,471Updated 3 years ago
- ☆2,335Updated 2 years ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,769Updated last month
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,166Updated last month
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆2,309Updated 3 weeks ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,850Updated 2 weeks ago
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information abo…☆1,684Updated 4 months ago
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial …☆1,443Updated 4 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,388Updated 8 months ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,030Updated 11 months ago