jonaslejon / malicious-pdf
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
☆2,941Updated 2 months ago
Alternatives and similar repositories for malicious-pdf:
Users that are interested in malicious-pdf are comparing it to the libraries listed below
- Rockyou for web fuzzing☆2,718Updated this week
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,651Updated last year
- Offensive Software Exploitation Course☆2,354Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆2,972Updated last week
- Tools & Interesting Things for RedTeam Ops☆2,169Updated 2 years ago
- All In One Web Recon☆2,364Updated 4 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,316Updated 3 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,921Updated 4 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,283Updated 2 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,876Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,334Updated 8 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,143Updated 5 months ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆3,959Updated last month
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,216Updated 4 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,324Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,758Updated 9 months ago
- Contextual Content Discovery Tool☆2,752Updated 10 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,736Updated 3 months ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆2,634Updated 8 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆6,025Updated this week
- A collection of awesome one-liner scripts especially for bug bounty tips.☆2,778Updated 7 months ago
- File upload vulnerability scanner and exploitation tool.☆3,169Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,530Updated last year
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,732Updated 8 months ago
- Wi-Fi Exploitation Framework☆2,483Updated 5 months ago
- A fast, simple, recursive content discovery tool written in Rust.☆6,277Updated this week
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,093Updated 8 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,135Updated last month
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,538Updated 2 years ago
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆3,963Updated this week