pussycat0x / malicious-pdf
Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator
☆169Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for malicious-pdf
- ☆162Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆383Updated 3 months ago
- Active Directory Labs/exams Review☆242Updated 3 years ago
- Windows for Red Teamers☆124Updated 2 years ago
- Prototype pollution scanner using headless chrome☆197Updated 2 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆178Updated 2 years ago
- scan for NTLM directories☆346Updated 4 months ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- ☆155Updated 2 years ago
- ☆121Updated 2 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆180Updated last month
- Check AWS S3 instances for read/write/delete access☆121Updated 2 years ago
- Make URL path combinations using a wordlist☆172Updated last year
- Full Nuclei automation script with logic explanation.☆236Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆290Updated last year
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆178Updated 10 months ago
- Password spraying tool and Bloodhound integration☆212Updated last year
- ☆149Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆126Updated 2 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆130Updated 3 years ago
- ☆104Updated 5 years ago
- ☆313Updated last month
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆117Updated 2 years ago
- Turns any junk text into a usable wordlist for brute-forcing.☆217Updated 7 months ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆277Updated last year
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆164Updated last year
- Wordlists handcrafted (and automated) with ♥☆190Updated 7 months ago
- Browser extension that extracts users from LinkedIn company pages☆155Updated last year
- Workshop given at Hack in Paris 2019☆121Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆366Updated last year