Skip to content

jonaslejon/malicious-pdf

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

86 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

malicious-pdf.png

made-with-python OpenSSF Best Practices

Malicious PDF Generator โ˜ ๏ธ

Generate 67 malicious PDF test files for testing phone-home callbacks, SSRF, XSS, XXE, NTLM credential theft, and data exfiltration in PDF viewers, converters, and web applications. Can be used with Burp Collaborator or Interact.sh

Used for penetration testing, bug bounty hunting, and/or red-teaming etc. I created this tool because I needed a tool to generate a bunch of PDF files with various links. Educational and professional purposes only.

Usage

pip install -r requirements.txt
python3 malicious-pdf.py burp-collaborator-url

Output will be written to the output/ directory as: test1.pdf, test2.pdf, test3.pdf etc.

Options

--output-dir DIR    Directory to save generated PDF files (default: output/)
--no-credit         Do not embed credit/attribution metadata in generated PDFs
--obfuscate LEVEL   Obfuscation level (0-3):
                      0 = None (default)
                      1 = PDF name hex encoding + string octal/hex encoding
                      2 = Level 1 + JS bracket notation + javascript: URI case/whitespace obfuscation
                      3 = Level 2 + FlateDecode stream compression

Example with obfuscation:

python3 malicious-pdf.py https://your-interact-sh-url --obfuscate 2

Maximum obfuscation (Level 4 wraps JS payloads in a base64 decoder stub so the original API calls never appear as literal substrings):

python3 malicious-pdf.py https://your-interact-sh-url --obfuscate 4

Purpose

  • Test web pages/services accepting PDF files
  • Test security products
  • Test PDF readers
  • Test PDF converters
  • Test server-side PDF processing libraries (PDFBox, iText, etc.)
  • Test PDF static analysis tools โ€” staged JS payloads (form-field /V, base64 decoder) defeat naรฏve /JS regex scanners
  • Bug bounty hunting โ€” useful for finding SSRF, XXE, blind callbacks, and NTLM leaks in file upload endpoints, PDF-to-image converters, and document processing pipelines on programs that accept PDF input

Credits

In Media

Complete Test Matrix

Click to expand all 70 test cases
Test File Function CVE/Reference Attack Vector Method Impact
test1.pdf create_malpdf() CVE-2018-4993 External file access /GoToE action with UNC path Network callback via file system
test1_1.pdf create_malpdf() CVE-2018-4993 External file access /GoToE action with HTTPS URL Network callback via HTTPS
test2.pdf create_malpdf2() XFA form submission Form data exfiltration XDP form with submit event Automatic form submission
test3.pdf create_malpdf3() JavaScript injection Code execution /OpenAction with app.openDoc() External document loading
test4.pdf create_malpdf4() CVE-2019-7089 XSLT injection XFA with external XSLT stylesheet UNC path callback
test5.pdf create_malpdf5() PDF101 research URI action /URI action type DNS prefetching/HTTP request
test6.pdf create_malpdf6() PDF101 research Launch action /Launch with external URL External resource execution
test7.pdf create_malpdf7() PDF101 research Remote PDF /GoToR action Remote PDF loading
test8.pdf create_malpdf8() PDF101 research Form submission /SubmitForm with HTML flags Form data submission
test9.pdf create_malpdf9() PDF101 research Data import /ImportData action External data import
test10.pdf create_malpdf10() CVE-2017-10951 JavaScript execution Foxit this.getURL() callback Network callback via Foxit Reader
test11.pdf create_malpdf11() EICAR test AV detection Embedded EICAR string Anti-virus testing
test12.pdf create_malpdf12() CVE-2014-8453 FormCalc data exfiltration XFA FormCalc Post() function Same-origin data exfiltration with cookies
test13.pdf create_malpdf13() Request injection CRLF header injection XFA submit textEncoding CRLF HTTP header manipulation
test14.svg create_malpdf14() ImageMagick shell injection Shell injection via SVG/MSL SVG-MSL polyglot authenticate attribute Remote code execution via ImageMagick
test15.pdf create_malpdf15() PDF specification FormCalc header injection XFA FormCalc Post() with custom headers Arbitrary HTTP header injection
test16.pdf create_malpdf16() PDF specification JavaScript via GotoE /GoToE with javascript: URI Browser XSS when PDF embedded via <embed>/<object>
test17.pdf create_malpdf17() CVE-2014-8452 XXE injection XMLData.parse() external entity XML external entity resolution
test18.pdf create_malpdf18() PortSwigger research Annotation URI injection Unescaped parens inject JS action via duplicate /A key XSS via PDF-Lib/jsPDF output
test19.pdf create_malpdf19() PortSwigger research PV auto-execution /AA /PV Screen annotation fires JS on page visible Automatic code execution (Acrobat)
test20.pdf create_malpdf20() PortSwigger research PC close trigger /AA /PC annotation fires JS on page close Code execution on close (Acrobat)
test21.pdf create_malpdf21() PortSwigger research SubmitForm SubmitPDF /SubmitForm with Flags 256 sends entire PDF Full PDF content exfiltration
test22.pdf create_malpdf22() PortSwigger research JS submitForm() this.submitForm() with cSubmitAs: "PDF" PDF content submission (Acrobat)
test23.pdf create_malpdf23() PortSwigger research Widget button injection Invisible /Btn widget covering page, JS on click Code execution (Chrome/PDFium)
test24.pdf create_malpdf24() PortSwigger research Text field SSRF Widget /Tx field with submitForm() POST Blind SSRF via form data
test25.pdf create_malpdf25() PortSwigger research Content extraction getPageNthWord() reads all text and exfiltrates Rendered text exfiltration
test26.pdf create_malpdf26() PortSwigger research Mouseover trigger /AA /E annotation fires JS on mouse enter Code execution on hover (PDFium)
test27 โ€” โ€” Removed Duplicate of test3 (Acrobat OpenAction JS) + test23 (Chrome Widget Btn) โ€”
test28.pdf create_malpdf28() PortSwigger research URL hijacking Unescaped parens inject new /URI action Click redirection via PDF-Lib/jsPDF
test29.pdf create_malpdf29() CVE-2024-4367 FontMatrix injection Type1 font FontMatrix string breaks out of c.transform() Arbitrary JS execution in PDF.js (Firefox < 126)
test30.pdf create_malpdf30() PDF101 research External XObject stream Image XObject fetches data from remote URL via /FS /URL Silent callback via page rendering (no actions/JS)
test31.pdf create_malpdf31() PDF101 research Thread action /S /Thread with remote FileSpec Network callback via thread reference
test32.pdf create_malpdf32() PDF101 research Launch with print /Launch with /Win << /O /print >> forces remote fetch Network callback via print operation
test33_1.pdf create_malpdf33_1() PDF101 research JS: this.submitForm() Acrobat JS form submission callback Acrobat Reader
test33_2.pdf create_malpdf33_2() PDF101 research JS: this.getURL() Acrobat JS URL fetch Acrobat Reader
test33_3.pdf create_malpdf33_3() PDF101 research JS: app.launchURL() Acrobat JS launch URL Acrobat Reader
test33_4.pdf create_malpdf33_4() PDF101 research JS: app.media.getURLData() Acrobat JS media fetch Acrobat Reader
test33_5.pdf create_malpdf33_5() PDF101 research JS: SOAP.connect() Acrobat JS SOAP connection Acrobat Reader
test33_6.pdf create_malpdf33_6() PDF101 research JS: SOAP.request() Acrobat JS SOAP request Acrobat Reader
test33_7.pdf create_malpdf33_7() PDF101 research JS: this.importDataObject() Acrobat JS data import Acrobat Reader
test33_8.pdf create_malpdf33_8() PDF101 research JS: app.openDoc() Acrobat JS open document Acrobat Reader
test33_9.pdf create_malpdf33_9() PDF101 research JS: fetch() Web API callback (PDF.js/browser) Firefox/PDF.js
test33_10.pdf create_malpdf33_10() PDF101 research JS: XMLHttpRequest Web API callback (PDF.js/browser) Firefox/PDF.js
test33_11.pdf create_malpdf33_11() PDF101 research JS: new Image() Web API image callback (PDF.js/browser) Firefox/PDF.js
test33_12.pdf create_malpdf33_12() PDF101 research JS: WebSocket Web API WebSocket callback (PDF.js/browser) Firefox/PDF.js
test33_13.pdf create_malpdf33_13() Adobe 0-day blog (Apr 2026) JS: RSS.addFeed() Acrobat JS RSS feed callback Acrobat Reader
test33_14.pdf create_malpdf33_14() Adobe 0-day blog (Apr 2026) JS: util.readFileIntoStream() + SOAP.request() Local file read + exfil chain (try/catch error path also callbacks) Acrobat Reader
test33_15.pdf create_malpdf33_15() Adobe 0-day blog (Apr 2026) Form-field-staged JS loader Base64 payload in /Tx widget /V, decoded via getField() + util.stringFromStream Acrobat Reader
test34_1.pdf create_malpdf34_1() PDF101 research UNC: XObject stream Image XObject with UNC path NTLM theft via page rendering
test34_2.pdf create_malpdf34_2() PDF101 research UNC: GoToR /GoToR action with UNC FileSpec NTLM theft via remote PDF
test34_3.pdf create_malpdf34_3() PDF101 research UNC: Thread /Thread action with UNC FileSpec NTLM theft via thread reference
test34_4.pdf create_malpdf34_4() PDF101 research UNC: URI /URI action with UNC path NTLM theft via URI action
test34_5.pdf create_malpdf34_5() PDF101 research UNC: JS submitForm this.submitForm() with UNC path NTLM theft via JS form submission
test34_6.pdf create_malpdf34_6() PDF101 research UNC: JS getURL this.getURL() with UNC path NTLM theft via JS URL fetch
test34_7.pdf create_malpdf34_7() PDF101 research UNC: JS launchURL app.launchURL() with UNC path NTLM theft via JS launch
test34_8.pdf create_malpdf34_8() PDF101 research UNC: JS SOAP SOAP.connect() with UNC path NTLM theft via JS SOAP
test34_9.pdf create_malpdf34_9() PDF101 research UNC: JS openDoc app.openDoc() with UNC path NTLM theft via JS open document
test35.pdf create_malpdf35() PDF101 research Names dictionary /Names /JavaScript catalog-level auto-execute trigger Alternative JS execution trigger
test36.pdf create_malpdf36() CVE-2016-2175 / CVE-2017-9096 XXE in XMP metadata XXE <!ENTITY> in /Metadata XMP stream Server-side callback (PDFBox, iText)
test37.pdf create_malpdf37() CVE-2016-2175 / CVE-2017-9096 XXE in XFA form data XXE <!ENTITY> in /AcroForm /XFA stream Server-side callback (PDFBox, iText)
test38.pdf create_malpdf38() CVE-2020-29075 Silent DNS tracking Catalog /AA with /WC, /WS, /DS triggers DNS callback without prompt (Acrobat)
test39.pdf create_malpdf39() CVE-2022-28244 CSP bypass RichMedia annotation with embedded HTML/JS Cross-origin request (Acrobat)
test40.pdf create_malpdf40() CVE-2018-5158 PostScript calculator injection /FunctionType 4 JS injection in image XObject JS execution in PDF.js worker (Firefox)
test41.pdf create_malpdf41() CVE-2018-20065 URI without user gesture /OpenAction with /S /URI auto-navigation Silent navigation (PDFium/Chrome)
test42.pdf create_malpdf42() CVE-2025-66516 XXE OOB parameter entity in XFA %xxe; param entity in /AcroForm /XFA forces DTD fetch Server-side blind XXE (Tika, Confluence, Jira)
test43.pdf create_malpdf43() CVE-2025-70401 Annotation /T field XSS <img> tag in Text annotation /T (author) field XSS callback (Apryse WebViewer, web viewers)
test44.pdf create_malpdf44() CVE-2024-12426 LibreOffice URL expansion /URI with vnd.sun.star.expand: expands ${HOME} Env var exfiltration (LibreOffice < 24.8.4)
test45.pdf create_malpdf45() CVE-2025-59803 OCG JS trigger on signing /AA /WP+/DP triggers JS via OCG in sign workflow Callback during signing (Foxit < 2025.2.1)
test46.pdf create_malpdf46() CVE-2026-25755 jsPDF object injection Broken JS string + injected /AA /O auto-action Auto-callback via any viewer (jsPDF < 4.2.0)
test47.pdf create_malpdf47() PDF 2.0 spec Associated Files HTML embed HTML via catalog /AF + /EF EmbeddedFile Callback via embedded HTML (PDF 2.0 viewers)
test48.pdf create_malpdf48() XFA spec XFA SOAP callback <submit method="soap"> with initialize event SOAP HTTP request (Acrobat XFA engine)

Todo: New test cases

  • Acrobat JS fingerprinting APIs โ€” Add test cases for reconnaissance/fingerprinting APIs used in the April 2026 Adobe 0-day exploit chain (ref): Collab.isDocReadOnly (filesystem probing), app.plugIns (enumerate installed plugins), app.viewerVersion (version fingerprinting)

Todo: Obfuscation methods not yet implemented

  • Empty-password PDF encryption โ€” Encrypt all strings/streams with empty user password. Document opens without prompting but static analysis tools cannot read content. Biggest gap in current obfuscation. Ref: Didier Stevens, How secure is PDF encryption?
  • Object streams (ObjStm) โ€” Hide PDF objects inside compressed stream containers. Simple parsers (including PDFiD without -O flag) miss objects entirely. Ref: PDF spec ISO 32000 ยง7.5.7
  • getAnnots() code storage โ€” Split JavaScript payload across annotation metadata fields (subject, author). Retrieve at runtime via app.doc.getAnnots()[n].subject and eval. Ref: Julia Wolf - PDF Obfuscation using getAnnots()
  • Info dict data extraction โ€” Store encoded payload in /Info trailer fields (/Title, /Author). Retrieve at runtime via info.Title in JS. Ref: corkami PDF tricks
  • AcroForm field value extraction โ€” Store payload fragments in form field /V values. Retrieve via getField("name").value in JS. Ref: corkami PDF tricks
  • Names tree split execution โ€” Split JavaScript across multiple /Names entries executed sequentially. Ref: corkami PDF tricks
  • Incremental updates after %%EOF โ€” Append new objects/actions after the original %%EOF marker via incremental update. Ref: PDF101 content masking, Didier Stevens
  • JS unescape() encoding โ€” Wrap JS payload in eval(unescape("%61%6C%65%72%74...")). Ref: corkami PDF tricks
  • Fake file headers โ€” Prepend JPEG/HTML/other magic bytes before %PDF- header (spec allows header within first 1024 bytes). Confuses file-type detection. Ref: corkami, Decalage
  • Anti-emulation checks โ€” Detect real Adobe Reader via event.target.zoomType == "FitPage" or global variable type checks before executing payload. Ref: corkami PDF tricks

Won't implement

  • CVE-2023-26369 - Adobe Acrobat TTF font heap OOB write โ€” Requires binary exploitation (heap spray, ROP chains, shellcode). No public PoC. Cannot produce a simple callback.
  • CVE-2021-28550 - Adobe Acrobat Use-After-Free โ€” Requires binary exploitation chain + sandbox escape (CVE-2021-31199/31201). No public PoC. Cannot produce a simple callback.

Star History

Star History Chart

About

๐Ÿ’€ Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF viewers, converters, and web applications. Can be used with Burp Collaborator or Interact.sh

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Contributors

Languages

โšก