Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jonaslejon/malicious-pdf
๐ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
https://github.com/jonaslejon/malicious-pdf
bugbounty bugbounty-tool pdf pdf-generation penetration-test penetration-testing penetrationtesting pentesting pentesting-tools python redteam redteaming scanner
Last synced: about 12 hours ago
JSON representation
๐ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
- Host: GitHub
- URL: https://github.com/jonaslejon/malicious-pdf
- Owner: jonaslejon
- License: bsd-2-clause
- Created: 2021-08-17T10:10:12.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2024-10-20T19:18:00.000Z (about 2 months ago)
- Last Synced: 2024-11-30T20:14:26.445Z (12 days ago)
- Topics: bugbounty, bugbounty-tool, pdf, pdf-generation, penetration-test, penetration-testing, penetrationtesting, pentesting, pentesting-tools, python, redteam, redteaming, scanner
- Language: Python
- Homepage:
- Size: 46.9 KB
- Stars: 2,886
- Watchers: 61
- Forks: 385
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-pdf - Malicious PDF Generator - home functionality (File Analysis / Security)
- awesome-pdf - Malicious PDF Generator - home functionality (File Analysis / Security)
- starred - jonaslejon/malicious-pdf - ๐ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh (Python)
- awesome-hacking-lists - jonaslejon/malicious-pdf - ๐ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh (Python)
- StarryDivineSky - jonaslejon/malicious-pdf - home ๅ่ฝ็ๆถๆ pdf ๆไปถใๅฏไปฅไธ Burp Collaborator ๆ Interact.sh ไธ่ตทไฝฟ็จ (ๅ ถไป_ๅฎๅ จไธๆธ้ / ็ฝ็ปๆๅก_ๅ ถไป)
README
![malicious-pdf.png](https://triop.se/wp-content/uploads/2021/08/malicious-pdf-e1629197726260.png)
[![made-with-python](https://img.shields.io/badge/Made%20with-Python-1f425f.svg)](https://www.python.org/) [![OpenSSF Best Practices](https://www.bestpractices.dev/projects/9599/badge)](https://www.bestpractices.dev/projects/9599)
# Malicious PDF Generator โ ๏ธ
Generate ten different malicious pdf files with phone-home functionality. Can be used with [Burp Collaborator](https://portswigger.net/burp/documentation/collaborator) or [Interact.sh](https://github.com/projectdiscovery/interactsh)
Used for penetration testing and/or red-teaming etc. I created this tool because i needed a third party tool to generate a bunch of PDF files with various links.
## Usage
`python3 malicious-pdf.py burp-collaborator-url`
Output will be written as: test1.pdf, test2.pdf, test3.pdf etc in the current directory.
## Purpose
- Test web pages/services accepting PDF-files
- Test security products
- Test PDF readers
- Test PDF converters## Credits
- [Insecure features in PDFs](https://web-in-security.blogspot.com/2021/01/insecure-features-in-pdfs.html)
- [Burp Suite UploadScanner](https://github.com/modzero/mod0BurpUploadScanner/)
- [Bad-Pdf](https://github.com/deepzec/Bad-Pdf)
- [A Curious Exploration of Malicious PDF Documents](https://www.scitepress.org/Papers/2020/89923/89923.pdf)
- ["Portable Document Flaws 101" talk at Black Hat USA 2020](https://github.com/RUB-NDS/PDF101)
- [Adobe Reader - PDF callback via XSLT stylesheet in XFA](https://insert-script.blogspot.com/2019/01/adobe-reader-pdf-callback-via-xslt.html)
- [Foxit PDF Reader PoC, DoHyun Lee](https://twitter.com/l33d0hyun/status/1448342241647366152)
- [Eicar test file by Stas Yakobov](https://github.com/fire1ce/eicar-standard-antivirus-test-files)## In Media
- [Brisk Infosec](https://www.briskinfosec.com/tooloftheday/toolofthedaydetail/Malicious-PDF)
- [Daily REDTeam](https://www.linkedin.com/posts/daily-red-team_github-jonaslejonmalicious-pdf-generate-activity-7096476604016582656-d9xM/)
- [Malicious PDF File | Red Team | Penetration Testing](https://www.youtube.com/watch?v=hf3p_t8CPWs)
- [John Hammond - Can a PDF File be Malware?](https://www.youtube.com/watch?v=TP4n8fBl6DA)## Todo
- Adobe Acrobat PDF Reader RCE when processing TTF fonts, CVE-2023-26369
- Adobe Acrobat and Reader Use-After-Free Vulnerability, CVE-2021-28550