<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>PDF on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/pdf/</link><description>Recent content in PDF on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sat, 07 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/pdf/index.xml" rel="self" type="application/rss+xml"/><item><title>HTB-A Call from the Museum</title><link>https://hexpysya.github.io/investigations/htb-a-call-from-the-museum/</link><pubDate>Sat, 07 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-a-call-from-the-museum/</guid><description>A phishing email with a password-protected ZIP delivered an LNK file that executed an obfuscated PowerShell stager — collecting system fingerprint data, checking in to a C2, and fetching a next-stage implant using hardcoded credentials. A decoy PDF was opened simultaneously to distract the victim.</description></item><item><title>Metasploit: adobe_pdf_embedded_exe_nojs</title><link>https://hexpysya.github.io/investigations/metasploit-adobe_pdf_embedded_exe_nojs/</link><pubDate>Sat, 22 Nov 2025 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/metasploit-adobe_pdf_embedded_exe_nojs/</guid><description>A malicious PDF uses a Launch action to execute cmd.exe, which runs an inline VBScript that reads hex-encoded shellcode directly from the PDF body, writes it to disk as an executable, and launches a Metasploit reverse shell.</description></item><item><title>Metasploit: adobe-pdf-embedded-file</title><link>https://hexpysya.github.io/investigations/metasploit-adobe-pdf-embedded-file/</link><pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/metasploit-adobe-pdf-embedded-file/</guid><description>A malicious PDF exploits JavaScript and Launch actions to extract and execute an embedded PE payload, establishing a reverse shell connection to an attacker-controlled server.</description></item></channel></rss>