ParanoiDF - PDF Analysis Suite based on PeePDF by Jose Miguel Esparza (http://peepdf.eternal-todo.com/). Tools added: Password cracking, redaction recovery, DRM removal, malicious JavaScript extraction, and more.
☆112May 25, 2023Updated 2 years ago
Alternatives and similar repositories for ParanoiDF
Users that are interested in ParanoiDF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- ☆15Nov 29, 2017Updated 8 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- Powerful Python tool to analyze PDF documents☆1,437Aug 19, 2024Updated last year
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Independent file type identification python library☆12Mar 16, 2023Updated 3 years ago
- Several PDF analysis reassembled with additional tips and tools☆351May 16, 2023Updated 2 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Machine Learning for malicious Javascript code detection☆19Jan 13, 2017Updated 9 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Tool to help analyze PDF files☆193May 22, 2014Updated 11 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- This repository includes some r2frida scripts to monitor iOS and Android Mobile apps.☆11Dec 21, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆476Jun 16, 2023Updated 2 years ago
- browser narlyness☆50Dec 11, 2013Updated 12 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- A sample application showing how to use grape to create a simple blog api.☆36Jul 21, 2022Updated 3 years ago
- Malware sample exchange system and API intended for Anti-Virus companies and researchers.☆16Aug 19, 2024Updated last year
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- This is the tutorial to repair kex in rootless nethunter termux.☆20Oct 1, 2023Updated 2 years ago
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Using LibVMI to detect malware☆32Apr 3, 2022Updated 3 years ago
- Nexus Repository Manager3 - 远程执行代码漏洞回显payload☆13Sep 29, 2020Updated 5 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A collection of tools for every PENTEST engagement☆12Oct 21, 2019Updated 6 years ago
- ☆14May 30, 2022Updated 3 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Convert back and forth between Heroku-style ENV['DATABASE_URL'] and Rails/ActiveRecord-style config/database.yml hashes.☆16Jun 12, 2017Updated 8 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago