pussycat0x / malicious-pdf
Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator
☆169Updated 3 years ago
Alternatives and similar repositories for malicious-pdf
Users that are interested in malicious-pdf are comparing it to the libraries listed below
Sorting:
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆395Updated 4 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆183Updated 2 years ago
- Windows for Red Teamers☆126Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 3 years ago
- Check AWS S3 instances for read/write/delete access☆121Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Active Directory Labs/exams Review☆252Updated 4 years ago
- Prototype pollution scanner using headless chrome☆218Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆300Updated last year
- Full Nuclei automation script with logic explanation.☆244Updated 3 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆189Updated 2 weeks ago
- Workshop given at Hack in Paris 2019☆121Updated last year
- Automated learning of regexes for DNS discovery☆366Updated 2 years ago
- ☆119Updated 2 years ago
- Attack Surface Discovery Tool☆108Updated 7 months ago
- ☆104Updated 5 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆110Updated 3 years ago
- ☆170Updated 3 years ago
- ☆52Updated 2 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆221Updated 2 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆127Updated 2 years ago
- IIS shortname scanner written in Go☆332Updated 2 years ago
- Http request smuggling vulnerability scanner☆227Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆433Updated last year
- scan for NTLM directories☆359Updated 10 months ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆280Updated 2 years ago
- A robust Red Team proxy written in Go.☆160Updated 3 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆127Updated 3 years ago
- ☆165Updated 4 years ago