This file implements a library and tool to make malicious PDF files.
☆14Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for MaliciousPDF
Users that are interested in MaliciousPDF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆31Mar 26, 2023Updated 3 years ago
- Simple PoC in PowerShell for CVE-2023-23397☆39Mar 16, 2023Updated 3 years ago
- Remake Of The USB Rubber Ducky In Python With Better Features. Steals IPv4+IPv6 And Other IPs, And Browsing History From: Brave, Microsof…☆16Oct 5, 2024Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆61Feb 4, 2025Updated last year
- linux based virus builder tool that can create a fully offline windows virus executable.☆13Apr 17, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 4 years ago
- sturdy-chainsaw☆71Aug 10, 2023Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆88Jan 7, 2025Updated last year
- Search drives for documents containing passwords☆65Jul 11, 2014Updated 11 years ago
- webshells written with malice☆34Aug 30, 2017Updated 8 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆78Dec 7, 2025Updated 4 months ago
- ☆24Apr 23, 2024Updated 2 years ago
- API discovery tool that maps attack surfaces from captured traffic and generates specs for REST, GraphQL, SOAP, and WebSocket APIs☆88Updated this week
- ☆49Dec 31, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆17Jan 26, 2026Updated 3 months ago
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆78Mar 15, 2026Updated last month
- ☆37Mar 18, 2026Updated last month
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Apr 20, 2026Updated 2 weeks ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆80Apr 11, 2026Updated 3 weeks ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 5 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆150Jun 20, 2022Updated 3 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 3 years ago
- Caido plugin for jxscout☆15Nov 22, 2025Updated 5 months ago
- This operator patches an ingress to automatically create subdomains for services based on annotations.☆11Aug 31, 2022Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 4 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆16May 29, 2022Updated 3 years ago
- using ML models for red teaming☆42Aug 9, 2023Updated 2 years ago
- Updated Evilginx3 Phishlet for Microsoft365☆27Aug 16, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆108Feb 11, 2026Updated 2 months ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Docker image for SQLiScanner☆15Jul 26, 2017Updated 8 years ago
- A proof of concept email spoofing tool built on Docker.☆130Aug 17, 2021Updated 4 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆78Aug 11, 2022Updated 3 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆43Jan 31, 2026Updated 3 months ago
- Android webviews and securiy☆24Sep 18, 2025Updated 7 months ago