jonaslejon / malicious-pdfLinks
π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
β3,086Updated last month
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,914Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,527Updated 2 months ago
- Rockyou for web fuzzingβ2,862Updated 2 weeks ago
- Quickly discover exposed hosts on the internet using multiple search engines.β2,678Updated 3 weeks ago
- Contextual Content Discovery Toolβ2,927Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huβ¦β2,205Updated last year
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. π‘οΈβοΈπ§β1,773Updated last year
- Tools & Interesting Things for RedTeam Opsβ2,208Updated last month
- a drop-in replacement for Nmap powered by shodan.ioβ3,079Updated 3 months ago
- β1,757Updated 2 months ago
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial β¦β1,387Updated 4 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,270Updated 10 months ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,447Updated this week
- A collection of awesome one-liner scripts especially for bug bounty tips.β2,904Updated last year
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,583Updated 5 months ago
- All In One Web Reconβ2,502Updated 3 months ago
- Real-world infosec wordlists, updated regularlyβ1,544Updated this week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,303Updated 6 months ago
- The fastest dork scanner written in Go.β1,239Updated last year
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information aboβ¦β1,645Updated last month
- Generates millions of keyword-based password mutations in seconds.β1,332Updated 2 months ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ4,121Updated last month
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitieβ¦β998Updated last year
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.β1,413Updated 4 months ago
- An XSS exploitation command-line interface and payload generator.β1,389Updated 6 months ago
- Reverse proxies cheatsheetβ1,835Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,802Updated last year
- β2,287Updated last year
- List of Github repositories and articles with list of dorks for different search enginesβ2,359Updated 4 months ago
- An OOB interaction gathering server and client libraryβ3,873Updated last week