nu11secur1ty / vulnerable-PDFLinks
☆11Updated last year
Alternatives and similar repositories for vulnerable-PDF
Users that are interested in vulnerable-PDF are comparing it to the libraries listed below
Sorting:
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 3 years ago
- CVE-2022-1040☆17Updated 2 years ago
- SonicWALL SSL-VPN Web Server Vulnerable Exploit☆48Updated 4 years ago
- Red Team C2 and Post Exploitation code☆37Updated last month
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 3 years ago
- Passwordless RDP Session Hijacking☆69Updated 3 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 3 months ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated last year
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Updated 4 years ago
- Source Code Management Attack Toolkit☆12Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- Self-healing RAT utilizing libp2p☆88Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Phish password protected Excel-Files☆105Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆25Updated 5 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Disable Windows Defender All Version☆32Updated 4 years ago
- PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github☆61Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- ☆101Updated 4 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Updated 7 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Windows 权限提升 BadPotato☆13Updated 4 years ago
- A sort of simple shell which support multiple protocols.☆100Updated 5 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Updated 6 years ago