pussycat0x / malicious-pdfView external linksLinks
Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator
β168Aug 30, 2021Updated 4 years ago
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- Pure C++, weaponized, fully automated implementation of RottenPotatoNGβ313Sep 16, 2021Updated 4 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ3,600Nov 14, 2025Updated 3 months ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-obβ¦β1,050Jan 22, 2026Updated 3 weeks ago
- AzureRT - A Powershell module implementing various Azure Red Team tacticsβ235Jun 17, 2022Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.β100Jan 18, 2022Updated 4 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalationβ214Jan 16, 2022Updated 4 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).β199Sep 19, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)β1,495Dec 21, 2023Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.β482Jul 9, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivyβs loader does this by β¦β747Aug 18, 2023Updated 2 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloadsβ386Apr 16, 2022Updated 3 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1β54Jul 11, 2021Updated 4 years ago
- β2,169Feb 21, 2023Updated 2 years ago
- CVE-2021-40444 PoCβ1,712Dec 25, 2021Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's dataβ447Oct 19, 2022Updated 3 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analytβ¦β17Jun 11, 2024Updated last year
- A malicious LDAP server for JNDI injection attacksβ76Nov 15, 2024Updated last year
- Inject .NET assemblies into an existing processβ508Jan 19, 2022Updated 4 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and eβ¦β292Mar 8, 2023Updated 2 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.β605Mar 19, 2022Updated 3 years ago
- β36May 27, 2024Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.β753Nov 16, 2021Updated 4 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movementβ369Dec 24, 2021Updated 4 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Goβ277Jan 14, 2023Updated 3 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.β117Feb 9, 2022Updated 4 years ago
- Hide your payload in DNSβ617May 3, 2023Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkitβ448Nov 2, 2023Updated 2 years ago
- Azure JWT Token Manipulation Toolsetβ711Dec 6, 2024Updated last year
- An Office365 User Attack Toolβ645Mar 19, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.β2,869Aug 18, 2023Updated 2 years ago
- Get file less command execution for lateral movement.β634Jun 3, 2022Updated 3 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analystsβ524Feb 1, 2022Updated 4 years ago
- β100Sep 1, 2024Updated last year
- A Canary which fires when uninstalledβ34Mar 16, 2021Updated 4 years ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).β1,191Jan 22, 2026Updated 3 weeks ago
- Python3 o365 User Enumeration Toolβ562Jan 28, 2026Updated 2 weeks ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controlsβ334Oct 9, 2021Updated 4 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.β155Dec 22, 2020Updated 5 years ago
- KaynLdr is a Reflective Loader written in C/ASMβ555Dec 3, 2023Updated 2 years ago