[ { "id": 374191623, "name": "Embedded-PDF", "full_name": "Jasmoon99\/Embedded-PDF", "owner": { "login": "Jasmoon99", "id": 45911474, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45911474?v=4", "html_url": "https:\/\/github.com\/Jasmoon99" }, "html_url": "https:\/\/github.com\/Jasmoon99\/Embedded-PDF", "description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ", "fork": false, "created_at": "2021-06-05T18:59:28Z", "updated_at": "2023-06-27T00:26:26Z", "pushed_at": "2021-06-06T09:41:51Z", "stargazers_count": 21, "watchers_count": 21, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 21, "score": 0, "subscribers_count": 2 }, { "id": 452158483, "name": "Embedded-Backdoor-Connection", "full_name": "omarothmann\/Embedded-Backdoor-Connection", "owner": { "login": "omarothmann", "id": 43515806, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43515806?v=4", "html_url": "https:\/\/github.com\/omarothmann" }, "html_url": "https:\/\/github.com\/omarothmann\/Embedded-Backdoor-Connection", "description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240.", "fork": false, "created_at": "2022-01-26T05:59:52Z", "updated_at": "2023-06-27T00:01:34Z", "pushed_at": "2022-01-26T06:47:31Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 } ]