Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator
☆166Aug 30, 2021Updated 4 years ago
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆314Sep 16, 2021Updated 4 years ago
- 💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vie…☆3,660Apr 10, 2026Updated last week
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,068Mar 20, 2026Updated 3 weeks ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Jan 18, 2022Updated 4 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆485Jul 9, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- ☆2,178Apr 3, 2026Updated 2 weeks ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Aug 18, 2023Updated 2 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆233Jun 17, 2022Updated 3 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆212Jan 16, 2022Updated 4 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆383Apr 16, 2022Updated 4 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,503Dec 21, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆18Feb 16, 2021Updated 5 years ago
- Load any Beacon Object File using Powershell!☆262Dec 9, 2021Updated 4 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆289Mar 8, 2023Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago
- ☆100Sep 1, 2024Updated last year
- CVE-2021-40444 PoC☆1,728Dec 25, 2021Updated 4 years ago
- Azure JWT Token Manipulation Toolset☆727Dec 6, 2024Updated last year
- Offensive RPC PoC☆89Sep 29, 2021Updated 4 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆36May 27, 2024Updated last year
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆607Mar 19, 2022Updated 4 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆372Dec 24, 2021Updated 4 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆259Jul 7, 2022Updated 3 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆759Nov 16, 2021Updated 4 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆450Nov 2, 2023Updated 2 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆227Jul 30, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆283Jan 14, 2023Updated 3 years ago
- ☆898Mar 25, 2026Updated 3 weeks ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,194Jan 22, 2026Updated 2 months ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆488Feb 24, 2023Updated 3 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Feb 9, 2022Updated 4 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆552Dec 3, 2023Updated 2 years ago
- An Office365 User Attack Tool☆647Mar 19, 2024Updated 2 years ago