This file implements a library and tool to make malicious PDF files.
☆13Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for MaliciousPDF
Users that are interested in MaliciousPDF are comparing it to the libraries listed below
Sorting:
- Simple PoC in PowerShell for CVE-2023-23397☆39Mar 16, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- 🌩️ Collection of BloodHound queries for Azure☆84Jan 7, 2025Updated last year
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Dec 7, 2025Updated 2 months ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Config files for my GitHub profile.☆10Dec 16, 2025Updated 2 months ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- PACU - Phishing Automation & Campaigning Utility☆37Nov 9, 2022Updated 3 years ago
- ☆14Jul 26, 2017Updated 8 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Remake Of The USB Rubber Ducky In Python With Better Features. Steals IPv4+IPv6 And Other IPs, And Browsing History From: Brave, Microsof…☆14Oct 5, 2024Updated last year
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆39Jan 31, 2026Updated last month
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- Import custom queries into BloodHound CE from a legacy BloodHound JSON file.☆10Mar 22, 2024Updated last year
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- A Firefox plugin that allows you to choose easily between different DNS over HTTPS servers☆12Apr 28, 2020Updated 5 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶 𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆26Nov 30, 2025Updated 3 months ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- ☆11Jun 6, 2023Updated 2 years ago
- 🤖 The Modern Port Scanner 🤖☆14Nov 5, 2024Updated last year
- A small stuff of telegram bot for pentest and information gathering.☆11Oct 3, 2020Updated 5 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆25Jan 31, 2026Updated last month
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.☆11Dec 14, 2025Updated 2 months ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- ☆16Jan 23, 2026Updated last month
- Shellcode loader with evasion capabilities written in Nim☆15Jan 25, 2025Updated last year
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Golang script to bypass the client-side health checks when logging into DUO protected accounts☆11Aug 26, 2023Updated 2 years ago
- ☆47Dec 31, 2024Updated last year
- ☆12Dec 6, 2022Updated 3 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated last year