An exploit that allows you to bind an exe to a pdf for the 2010 adobe reader.
☆14Nov 26, 2019Updated 6 years ago
Alternatives and similar repositories for DisloyalPDF
Users that are interested in DisloyalPDF are comparing it to the libraries listed below
Sorting:
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Jan 23, 2017Updated 9 years ago
- converts EXE (or other binary) files to VBS scripts☆23Oct 15, 2012Updated 13 years ago
- VBA Obfuscator which I used for obfuscating vba codes to embed into Microsoft Word document while I'm doing some signature bypass testing…☆32Feb 26, 2020Updated 6 years ago
- Obfuscate URLs (can be used in requests).☆16Aug 16, 2023Updated 2 years ago
- powershell免杀混淆器,简单有效。A simple and effective powershell obfuscaiton tool bypass Anti-Virus☆19Dec 2, 2022Updated 3 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Sep 5, 2021Updated 4 years ago
- Embedding executable files in PDF Documents☆47Mar 21, 2019Updated 6 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Oct 19, 2019Updated 6 years ago
- 该项目为Shellocde加载器,详细介绍了我们如何绕过防病毒软件,以及该工具如何使用☆22Jun 22, 2022Updated 3 years ago
- ccva is software that came to my mind watching mr robot series. It allows you to hide more files into another one (.mp3 , .jpg, .pdf, .ex…☆20Oct 19, 2019Updated 6 years ago
- Limited Sniper for Roblox.com!☆10Oct 20, 2021Updated 4 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆60Sep 30, 2021Updated 4 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆53Jun 12, 2025Updated 8 months ago
- AV/EDR killer using BYOVD technique☆43Sep 27, 2024Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆27Mar 26, 2023Updated 2 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Dec 24, 2023Updated 2 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Dec 5, 2022Updated 3 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- Bot to get every sneaker☆10Oct 24, 2022Updated 3 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- ☆10Updated this week
- A remote administration tool for Windows, written in C#☆36Mar 15, 2021Updated 4 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- Simple Free Crypter for .NET Trojans like njRAT☆199Mar 10, 2020Updated 5 years ago
- Disable Windows Defender All Version☆31Jan 5, 2021Updated 5 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Nov 2, 2023Updated 2 years ago
- ☆44Oct 9, 2023Updated 2 years ago
- Python to analyse bitcoin blockchain, chainstate, blockindex, mempool etc☆10Jun 18, 2019Updated 6 years ago
- Discord Gen Bot Tutorial☆10Jun 18, 2024Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- Stealer chrome v81+, Firefox v75+, And more than 30 different programs and crypto-wallets☆11May 1, 2020Updated 5 years ago
- One of the best Grabbers to get the Passwords, Cookies and tokens from your friends ;)☆10Aug 29, 2023Updated 2 years ago
- This Project is in process and i will start working on it this weekend. It is used to call victims with a botvoice to ask for their 2fa c…☆10Mar 28, 2022Updated 3 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 3 years ago