πŸ”
OffSec Wiki
search
⌘Ctrlk
πŸ”
OffSec Wiki
  • Tools
  • Information Gathering
  • Exploitation
    • Exploit Notes
    • Metasploit
    • Shells / Payloads
    • Spawn BASH
    • Netcat
    • PwnKit - CVE- 2021-4034
    • Hydra Brute Forcing
    • WFUZZ Brute Forcing
    • MySQL Interactive console
    • SQLMap
    • Redis
    • SMTP Email Shell
    • PHP Shells
    • SQL Shells
    • Oracle Padding Attack
    • WIN Shells
    • Web Shells
    • Upgrade Shell
    • Nmap nse vuln scripts
    • EvilPDF
    • BITB
    • Payload obfuscation & AV Evasion
    • SHHHHLOADER
    • PDF Obfuscation
    • CSV Injection
    • Malicious Macros
    • Eternal Blue
    • Google Dorks
    • QR code Hacking
    • TLS Attacks
    • Exploit collection
    • RevShell Generator
    • BadUSB attack vs AMSI
    • Bypass 4xx
  • Cracking
  • Enumeration
  • API Sec
  • Web Pentesting
  • Linux
  • Wordpress
  • Post Exploitation
  • Persistence
  • Powershell
  • RED Teaming
  • Purple Teaming
  • Reverse Engineering
  • Pivoting
  • Metasploit
  • Networking
  • OSINT
  • Active Directory
  • Cloud
  • Containers
  • WIFI
  • Buffer Overflow
  • Code Review
  • Routers
  • Automotive CyberSec
  • Threat Modeling
  • Hardware & Lock Bypassing
  • Scripting
  • General PT Methodology
  • Blockchain
  • Challenges
  • Flipper
  • CERTS
  • Notes
  • Hacking Kubernetes
  • CV
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Exploitation

PDF Obfuscation

https://systemweakness.com/pdf-hacking-made-simple-5-steps-to-the-power-of-pdf-6de2ab6d9cc5 https://www.golinuxcloud.com/embed-payload-in-pdf/ https://www.digital.security/en/blog/bypassing-antivirus-detection-pdf-exploitarrow-up-right

PreviousSHHHHLOADERchevron-leftNextCSV Injectionchevron-right

Last updated 3 years ago