Generate 67 malicious PDF test files for testing phone-home callbacks, SSRF, XSS, XXE, NTLM credential theft, and data exfiltration in PDF viewers, converters, and web applications. Can be used with Burp Collaborator or Interact.sh
Used for penetration testing, bug bounty hunting, and/or red-teaming etc. I created this tool because I needed a tool to generate a bunch of PDF files with various links. Educational and professional purposes only.
pip install -r requirements.txt
python3 malicious-pdf.py burp-collaborator-url
Output will be written to the output/ directory as: test1.pdf, test2.pdf, test3.pdf etc.
--output-dir DIR Directory to save generated PDF files (default: output/)
--no-credit Do not embed credit/attribution metadata in generated PDFs
--obfuscate LEVEL Obfuscation level (0-3):
0 = None (default)
1 = PDF name hex encoding + string octal/hex encoding
2 = Level 1 + JS bracket notation + javascript: URI case/whitespace obfuscation
3 = Level 2 + FlateDecode stream compression
Example with obfuscation:
python3 malicious-pdf.py https://your-interact-sh-url --obfuscate 2
Maximum obfuscation (Level 4 wraps JS payloads in a base64 decoder stub so the original API calls never appear as literal substrings):
python3 malicious-pdf.py https://your-interact-sh-url --obfuscate 4
- Test web pages/services accepting PDF files
- Test security products
- Test PDF readers
- Test PDF converters
- Test server-side PDF processing libraries (PDFBox, iText, etc.)
- Test PDF static analysis tools โ staged JS payloads (form-field
/V, base64 decoder) defeat naรฏve/JSregex scanners - Bug bounty hunting โ useful for finding SSRF, XXE, blind callbacks, and NTLM leaks in file upload endpoints, PDF-to-image converters, and document processing pipelines on programs that accept PDF input
- Insecure features in PDFs
- Burp Suite UploadScanner
- Bad-Pdf
- A Curious Exploration of Malicious PDF Documents
- "Portable Document Flaws 101" talk at Black Hat USA 2020
- Adobe Reader - PDF callback via XSLT stylesheet in XFA
- Foxit PDF Reader PoC, DoHyun Lee
- Eicar test file by Stas Yakobov
- Multiple PDF Vulnerabilities - FormCalc & XXE
- PDF - Mess with the web - FormCalc header injection
- Adobe Reader PDF - Client Side Request Injection
- ImageMagick - Shell injection via PDF password
- Portable Data Exfiltration - PortSwigger Research
- CVE-2024-4367 - Arbitrary JS execution in PDF.js
- PDF File Formats Security - Philippe Lagadec
- CVE-2016-2175 - Apache PDFBox XXE
- CVE-2017-9096 - iText XXE
- CVE-2020-29075 - Acrobat Reader silent DNS tracking
- CVE-2022-28244 - Acrobat Reader CSP bypass
- CVE-2018-5158 - Firefox PDF.js PostScript calculator injection
- CVE-2018-20065 - PDFium URI action without user gesture
- ExpMon - Sophisticated Adobe Reader 0-day analysis (April 2026) โ inspiration for test33_13/14/15 and obfuscation Level 4
- Brisk Infosec
- Daily REDTeam
- Malicious PDF File | Red Team | Penetration Testing
- John Hammond - Can a PDF File be Malware?
- Black Hat Ethical Hacking
- 0x1 Pentesting Collection
- Security Toolkit / WADComs
- unsafe.sh
- Cristi Zot on LinkedIn
- Siva R. on LinkedIn
Click to expand all 70 test cases
| Test File | Function | CVE/Reference | Attack Vector | Method | Impact |
|---|---|---|---|---|---|
| test1.pdf | create_malpdf() |
CVE-2018-4993 | External file access | /GoToE action with UNC path |
Network callback via file system |
| test1_1.pdf | create_malpdf() |
CVE-2018-4993 | External file access | /GoToE action with HTTPS URL |
Network callback via HTTPS |
| test2.pdf | create_malpdf2() |
XFA form submission | Form data exfiltration | XDP form with submit event | Automatic form submission |
| test3.pdf | create_malpdf3() |
JavaScript injection | Code execution | /OpenAction with app.openDoc() |
External document loading |
| test4.pdf | create_malpdf4() |
CVE-2019-7089 | XSLT injection | XFA with external XSLT stylesheet | UNC path callback |
| test5.pdf | create_malpdf5() |
PDF101 research | URI action | /URI action type |
DNS prefetching/HTTP request |
| test6.pdf | create_malpdf6() |
PDF101 research | Launch action | /Launch with external URL |
External resource execution |
| test7.pdf | create_malpdf7() |
PDF101 research | Remote PDF | /GoToR action |
Remote PDF loading |
| test8.pdf | create_malpdf8() |
PDF101 research | Form submission | /SubmitForm with HTML flags |
Form data submission |
| test9.pdf | create_malpdf9() |
PDF101 research | Data import | /ImportData action |
External data import |
| test10.pdf | create_malpdf10() |
CVE-2017-10951 | JavaScript execution | Foxit this.getURL() callback |
Network callback via Foxit Reader |
| test11.pdf | create_malpdf11() |
EICAR test | AV detection | Embedded EICAR string | Anti-virus testing |
| test12.pdf | create_malpdf12() |
CVE-2014-8453 | FormCalc data exfiltration | XFA FormCalc Post() function |
Same-origin data exfiltration with cookies |
| test13.pdf | create_malpdf13() |
Request injection | CRLF header injection | XFA submit textEncoding CRLF |
HTTP header manipulation |
| test14.svg | create_malpdf14() |
ImageMagick shell injection | Shell injection via SVG/MSL | SVG-MSL polyglot authenticate attribute |
Remote code execution via ImageMagick |
| test15.pdf | create_malpdf15() |
PDF specification | FormCalc header injection | XFA FormCalc Post() with custom headers |
Arbitrary HTTP header injection |
| test16.pdf | create_malpdf16() |
PDF specification | JavaScript via GotoE | /GoToE with javascript: URI |
Browser XSS when PDF embedded via <embed>/<object> |
| test17.pdf | create_malpdf17() |
CVE-2014-8452 | XXE injection | XMLData.parse() external entity |
XML external entity resolution |
| test18.pdf | create_malpdf18() |
PortSwigger research | Annotation URI injection | Unescaped parens inject JS action via duplicate /A key |
XSS via PDF-Lib/jsPDF output |
| test19.pdf | create_malpdf19() |
PortSwigger research | PV auto-execution | /AA /PV Screen annotation fires JS on page visible |
Automatic code execution (Acrobat) |
| test20.pdf | create_malpdf20() |
PortSwigger research | PC close trigger | /AA /PC annotation fires JS on page close |
Code execution on close (Acrobat) |
| test21.pdf | create_malpdf21() |
PortSwigger research | SubmitForm SubmitPDF | /SubmitForm with Flags 256 sends entire PDF |
Full PDF content exfiltration |
| test22.pdf | create_malpdf22() |
PortSwigger research | JS submitForm() | this.submitForm() with cSubmitAs: "PDF" |
PDF content submission (Acrobat) |
| test23.pdf | create_malpdf23() |
PortSwigger research | Widget button injection | Invisible /Btn widget covering page, JS on click |
Code execution (Chrome/PDFium) |
| test24.pdf | create_malpdf24() |
PortSwigger research | Text field SSRF | Widget /Tx field with submitForm() POST |
Blind SSRF via form data |
| test25.pdf | create_malpdf25() |
PortSwigger research | Content extraction | getPageNthWord() reads all text and exfiltrates |
Rendered text exfiltration |
| test26.pdf | create_malpdf26() |
PortSwigger research | Mouseover trigger | /AA /E annotation fires JS on mouse enter |
Code execution on hover (PDFium) |
| โ | โ | Removed | Duplicate of test3 (Acrobat OpenAction JS) + test23 (Chrome Widget Btn) | โ | |
| test28.pdf | create_malpdf28() |
PortSwigger research | URL hijacking | Unescaped parens inject new /URI action |
Click redirection via PDF-Lib/jsPDF |
| test29.pdf | create_malpdf29() |
CVE-2024-4367 | FontMatrix injection | Type1 font FontMatrix string breaks out of c.transform() |
Arbitrary JS execution in PDF.js (Firefox < 126) |
| test30.pdf | create_malpdf30() |
PDF101 research | External XObject stream | Image XObject fetches data from remote URL via /FS /URL |
Silent callback via page rendering (no actions/JS) |
| test31.pdf | create_malpdf31() |
PDF101 research | Thread action | /S /Thread with remote FileSpec |
Network callback via thread reference |
| test32.pdf | create_malpdf32() |
PDF101 research | Launch with print | /Launch with /Win << /O /print >> forces remote fetch |
Network callback via print operation |
| test33_1.pdf | create_malpdf33_1() |
PDF101 research | JS: this.submitForm() |
Acrobat JS form submission callback | Acrobat Reader |
| test33_2.pdf | create_malpdf33_2() |
PDF101 research | JS: this.getURL() |
Acrobat JS URL fetch | Acrobat Reader |
| test33_3.pdf | create_malpdf33_3() |
PDF101 research | JS: app.launchURL() |
Acrobat JS launch URL | Acrobat Reader |
| test33_4.pdf | create_malpdf33_4() |
PDF101 research | JS: app.media.getURLData() |
Acrobat JS media fetch | Acrobat Reader |
| test33_5.pdf | create_malpdf33_5() |
PDF101 research | JS: SOAP.connect() |
Acrobat JS SOAP connection | Acrobat Reader |
| test33_6.pdf | create_malpdf33_6() |
PDF101 research | JS: SOAP.request() |
Acrobat JS SOAP request | Acrobat Reader |
| test33_7.pdf | create_malpdf33_7() |
PDF101 research | JS: this.importDataObject() |
Acrobat JS data import | Acrobat Reader |
| test33_8.pdf | create_malpdf33_8() |
PDF101 research | JS: app.openDoc() |
Acrobat JS open document | Acrobat Reader |
| test33_9.pdf | create_malpdf33_9() |
PDF101 research | JS: fetch() |
Web API callback (PDF.js/browser) | Firefox/PDF.js |
| test33_10.pdf | create_malpdf33_10() |
PDF101 research | JS: XMLHttpRequest |
Web API callback (PDF.js/browser) | Firefox/PDF.js |
| test33_11.pdf | create_malpdf33_11() |
PDF101 research | JS: new Image() |
Web API image callback (PDF.js/browser) | Firefox/PDF.js |
| test33_12.pdf | create_malpdf33_12() |
PDF101 research | JS: WebSocket |
Web API WebSocket callback (PDF.js/browser) | Firefox/PDF.js |
| test33_13.pdf | create_malpdf33_13() |
Adobe 0-day blog (Apr 2026) | JS: RSS.addFeed() |
Acrobat JS RSS feed callback | Acrobat Reader |
| test33_14.pdf | create_malpdf33_14() |
Adobe 0-day blog (Apr 2026) | JS: util.readFileIntoStream() + SOAP.request() |
Local file read + exfil chain (try/catch error path also callbacks) | Acrobat Reader |
| test33_15.pdf | create_malpdf33_15() |
Adobe 0-day blog (Apr 2026) | Form-field-staged JS loader | Base64 payload in /Tx widget /V, decoded via getField() + util.stringFromStream |
Acrobat Reader |
| test34_1.pdf | create_malpdf34_1() |
PDF101 research | UNC: XObject stream | Image XObject with UNC path | NTLM theft via page rendering |
| test34_2.pdf | create_malpdf34_2() |
PDF101 research | UNC: GoToR | /GoToR action with UNC FileSpec |
NTLM theft via remote PDF |
| test34_3.pdf | create_malpdf34_3() |
PDF101 research | UNC: Thread | /Thread action with UNC FileSpec |
NTLM theft via thread reference |
| test34_4.pdf | create_malpdf34_4() |
PDF101 research | UNC: URI | /URI action with UNC path |
NTLM theft via URI action |
| test34_5.pdf | create_malpdf34_5() |
PDF101 research | UNC: JS submitForm | this.submitForm() with UNC path |
NTLM theft via JS form submission |
| test34_6.pdf | create_malpdf34_6() |
PDF101 research | UNC: JS getURL | this.getURL() with UNC path |
NTLM theft via JS URL fetch |
| test34_7.pdf | create_malpdf34_7() |
PDF101 research | UNC: JS launchURL | app.launchURL() with UNC path |
NTLM theft via JS launch |
| test34_8.pdf | create_malpdf34_8() |
PDF101 research | UNC: JS SOAP | SOAP.connect() with UNC path |
NTLM theft via JS SOAP |
| test34_9.pdf | create_malpdf34_9() |
PDF101 research | UNC: JS openDoc | app.openDoc() with UNC path |
NTLM theft via JS open document |
| test35.pdf | create_malpdf35() |
PDF101 research | Names dictionary | /Names /JavaScript catalog-level auto-execute trigger |
Alternative JS execution trigger |
| test36.pdf | create_malpdf36() |
CVE-2016-2175 / CVE-2017-9096 | XXE in XMP metadata | XXE <!ENTITY> in /Metadata XMP stream |
Server-side callback (PDFBox, iText) |
| test37.pdf | create_malpdf37() |
CVE-2016-2175 / CVE-2017-9096 | XXE in XFA form data | XXE <!ENTITY> in /AcroForm /XFA stream |
Server-side callback (PDFBox, iText) |
| test38.pdf | create_malpdf38() |
CVE-2020-29075 | Silent DNS tracking | Catalog /AA with /WC, /WS, /DS triggers |
DNS callback without prompt (Acrobat) |
| test39.pdf | create_malpdf39() |
CVE-2022-28244 | CSP bypass | RichMedia annotation with embedded HTML/JS | Cross-origin request (Acrobat) |
| test40.pdf | create_malpdf40() |
CVE-2018-5158 | PostScript calculator injection | /FunctionType 4 JS injection in image XObject |
JS execution in PDF.js worker (Firefox) |
| test41.pdf | create_malpdf41() |
CVE-2018-20065 | URI without user gesture | /OpenAction with /S /URI auto-navigation |
Silent navigation (PDFium/Chrome) |
| test42.pdf | create_malpdf42() |
CVE-2025-66516 | XXE OOB parameter entity in XFA | %xxe; param entity in /AcroForm /XFA forces DTD fetch |
Server-side blind XXE (Tika, Confluence, Jira) |
| test43.pdf | create_malpdf43() |
CVE-2025-70401 | Annotation /T field XSS | <img> tag in Text annotation /T (author) field |
XSS callback (Apryse WebViewer, web viewers) |
| test44.pdf | create_malpdf44() |
CVE-2024-12426 | LibreOffice URL expansion | /URI with vnd.sun.star.expand: expands ${HOME} |
Env var exfiltration (LibreOffice < 24.8.4) |
| test45.pdf | create_malpdf45() |
CVE-2025-59803 | OCG JS trigger on signing | /AA /WP+/DP triggers JS via OCG in sign workflow |
Callback during signing (Foxit < 2025.2.1) |
| test46.pdf | create_malpdf46() |
CVE-2026-25755 | jsPDF object injection | Broken JS string + injected /AA /O auto-action |
Auto-callback via any viewer (jsPDF < 4.2.0) |
| test47.pdf | create_malpdf47() |
PDF 2.0 spec | Associated Files HTML embed | HTML via catalog /AF + /EF EmbeddedFile |
Callback via embedded HTML (PDF 2.0 viewers) |
| test48.pdf | create_malpdf48() |
XFA spec | XFA SOAP callback | <submit method="soap"> with initialize event |
SOAP HTTP request (Acrobat XFA engine) |
- Acrobat JS fingerprinting APIs โ Add test cases for reconnaissance/fingerprinting APIs used in the April 2026 Adobe 0-day exploit chain (ref):
Collab.isDocReadOnly(filesystem probing),app.plugIns(enumerate installed plugins),app.viewerVersion(version fingerprinting)
- Empty-password PDF encryption โ Encrypt all strings/streams with empty user password. Document opens without prompting but static analysis tools cannot read content. Biggest gap in current obfuscation. Ref: Didier Stevens, How secure is PDF encryption?
- Object streams (ObjStm) โ Hide PDF objects inside compressed stream containers. Simple parsers (including PDFiD without
-Oflag) miss objects entirely. Ref: PDF spec ISO 32000 ยง7.5.7 - getAnnots() code storage โ Split JavaScript payload across annotation metadata fields (subject, author). Retrieve at runtime via
app.doc.getAnnots()[n].subjectand eval. Ref: Julia Wolf - PDF Obfuscation using getAnnots() - Info dict data extraction โ Store encoded payload in
/Infotrailer fields (/Title,/Author). Retrieve at runtime viainfo.Titlein JS. Ref: corkami PDF tricks - AcroForm field value extraction โ Store payload fragments in form field
/Vvalues. Retrieve viagetField("name").valuein JS. Ref: corkami PDF tricks - Names tree split execution โ Split JavaScript across multiple
/Namesentries executed sequentially. Ref: corkami PDF tricks - Incremental updates after %%EOF โ Append new objects/actions after the original
%%EOFmarker via incremental update. Ref: PDF101 content masking, Didier Stevens - JS
unescape()encoding โ Wrap JS payload ineval(unescape("%61%6C%65%72%74...")). Ref: corkami PDF tricks - Fake file headers โ Prepend JPEG/HTML/other magic bytes before
%PDF-header (spec allows header within first 1024 bytes). Confuses file-type detection. Ref: corkami, Decalage - Anti-emulation checks โ Detect real Adobe Reader via
event.target.zoomType == "FitPage"or global variable type checks before executing payload. Ref: corkami PDF tricks
CVE-2023-26369 - Adobe Acrobat TTF font heap OOB writeโ Requires binary exploitation (heap spray, ROP chains, shellcode). No public PoC. Cannot produce a simple callback.CVE-2021-28550 - Adobe Acrobat Use-After-Freeโ Requires binary exploitation chain + sandbox escape (CVE-2021-31199/31201). No public PoC. Cannot produce a simple callback.
