peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks. With peepdf it's possible to see all the objects in the document showing the suspicious elements, supports all the most used filters and encodings, it can parse different versions of a file, object streams and encrypted files. With the installation of Spidermonkey and Libemu it provides Javascript and shellcode analysis wrappers too. It's also able to create new PDF files and to modify existent ones.
d33183f26435322007fe6f34df27b06941c7bd1ea2307d6311f0d0bca46042eb
Foxit Reader versions 4.0 and below pdf jailbreak exploit.
21d0239f1edc7ffe26fec255c0ce916d48c7a66bcdd415062350700d00c163e4
WzdFTPD versions 8.0 and below remote denial of service exploit.
3af1901094289c5b22e03c2160876781f8ba44b8a81cc2fe0f5a814498bcdfbd
Ekiga GetHostAddress remote denial of service exploit.
7d1d7087dcd522d63e3e4a08b0c680f36f2c28abc0cc5cef8a179d383398b97f
OpenH323 Opal SIP protocol remote denial of service exploit.
9268fc7c6cfb00968599dd1e702db4d1d24c7bc8caf240f93b1ef2ef3c3a4af0
OPAL versions 2.2.8 and below and Ekiga versions 2.0.9 and below suffer from a denial of service condition due to insufficiently validating the Content-Length field of a SIP request.
4d364df06d8fbbc07a007d1e0a7b5b491550f9b20da4c09aa796e46c096883f4
Due to poor memory allocation management, Ekiga versions 2.0.5 and below are susceptible to a denial of service condition.
f96123da6a4fdf8c6cf9e4c413f57a25dee873f75f0e9569dcef9eb45344294d
WzdFTPD versions 8.0 and below suffer from a remote denial of service condition.
2ba1620efce67c106b58a229d7cc8aa6c53222876b7d5c6d8814adc2b87e382e