Extract hidden data from pdf files
☆64Oct 23, 2018Updated 7 years ago
Alternatives and similar repositories for pdfxplr
Users that are interested in pdfxplr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- PDF Name Registry☆22Mar 9, 2026Updated 2 weeks ago
- Miscellaneous small bits and bobs.☆11Sep 8, 2025Updated 6 months ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Burp Suite Attack Selector Plugin☆60Nov 23, 2017Updated 8 years ago
- This is a WHOIS client library for Rust, inspired by https://github.com/hjr265/node-whois☆25Nov 24, 2025Updated 3 months ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- dcsync bof☆46Feb 13, 2026Updated last month
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- NOISE creates "real-looking" text based upon a collection of reference texts, which can then be used in emails, tweets, web searches, IRC…☆15Apr 7, 2015Updated 10 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Oct 24, 2017Updated 8 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- A simple tool to drop-catch expiring domains.☆16Oct 31, 2018Updated 7 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆26Aug 31, 2023Updated 2 years ago
- Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface cre…☆13Mar 15, 2022Updated 4 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Now you won't miss the moment the domain expires.☆27Oct 13, 2025Updated 5 months ago
- Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Accoun…☆16Apr 26, 2020Updated 5 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- Mainframe bruter and screen automation utility.☆42Sep 28, 2014Updated 11 years ago
- ICNet in TensorFlow, Real-Time Segmentation☆10Aug 17, 2018Updated 7 years ago
- ☆81Mar 11, 2026Updated last week
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- PWA to add comment to Github file.☆17Mar 17, 2026Updated last week
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- ℁ Retrieve your external IP address via DNS☆16Mar 3, 2023Updated 3 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated last year
- Your friendly neighbourhood image resizing API. Resize or aspect, you're cropping with me.☆11Apr 29, 2021Updated 4 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago