superzerosec / evilpdf
☆133Updated last year
Related projects ⓘ
Alternatives and complementary repositories for evilpdf
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆54Updated 3 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆263Updated 5 months ago
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆119Updated 2 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆108Updated 3 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆69Updated 2 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆139Updated 5 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆104Updated 5 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆129Updated 4 months ago
- This repository contains a few leaked files of HookBot.☆102Updated last year
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆67Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆94Updated 3 weeks ago
- Social Engineering Browser Update Attack.☆54Updated last year
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆119Updated last month
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆82Updated 9 months ago
- SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web a…☆112Updated 2 months ago
- PowerJoker is a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.☆35Updated 7 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆99Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆119Updated 2 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆170Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆71Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 2 years ago
- Information Gathering tool for a Website or IP address☆42Updated 9 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆84Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆36Updated 11 months ago
- ☆117Updated 8 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆48Updated 8 months ago