Skip to content

πŸ’€ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

License

Notifications You must be signed in to change notification settings

jonaslejon/malicious-pdf

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

64 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

malicious-pdf.png

made-with-python OpenSSF Best Practices

Malicious PDF Generator ☠️

Generate ten different malicious PDF files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

Used for penetration testing and/or red-teaming etc. I created this tool because I needed a tool to generate a bunch of PDF files with various links. Educational and professional purposes only.

Usage

pip install -r requirements.txt
python3 malicious-pdf.py burp-collaborator-url

Output will be written as: test1.pdf, test2.pdf, test3.pdf etc in the current directory.

Complete Test Matrix

Test File Function CVE/Reference Attack Vector Method Impact
test1.pdf create_malpdf() CVE-2018-4993 External file access /GoToE action with UNC path Network callback via file system
test1bis.pdf create_malpdf() CVE-2018-4993 External file access /GoToE action with HTTPS URL Network callback via HTTPS
test2.pdf create_malpdf2() XFA form submission Form data exfiltration XDP form with submit event Automatic form submission
test3.pdf create_malpdf3() JavaScript injection Code execution /OpenAction with app.openDoc() External document loading
test4.pdf create_malpdf4() CVE-2019-7089 XSLT injection XFA with external XSLT stylesheet UNC path callback
test5.pdf create_malpdf5() PDF101 research URI action /URI action type DNS prefetching/HTTP request
test6.pdf create_malpdf6() PDF101 research Launch action /Launch with external URL External resource execution
test7.pdf create_malpdf7() PDF101 research Remote PDF /GoToR action Remote PDF loading
test8.pdf create_malpdf8() PDF101 research Form submission /SubmitForm with HTML flags Form data submission
test9.pdf create_malpdf9() PDF101 research Data import /ImportData action External data import
test10.pdf create_malpdf10() CVE-2017-10951 JavaScript execution JavaScript to launch Calculator Application execution
test11.pdf create_malpdf11() EICAR test AV detection Embedded EICAR string Anti-virus testing

Purpose

  • Test web pages/services accepting PDF files
  • Test security products
  • Test PDF readers
  • Test PDF converters

Credits

In Media

Todo

  • Adobe Acrobat PDF Reader RCE when processing TTF fonts, CVE-2023-26369
  • Adobe Acrobat and Reader Use-After-Free Vulnerability, CVE-2021-28550

Star History

Star History Chart

About

πŸ’€ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Languages

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy