Find zero-days while you sleep. DeepZero is an automated vulnerability research framework that parses, decompiles, and analyzes thousands of Windows kernel drivers for exploitable IOCTLs natively using AI agents.
☆380Apr 28, 2026Updated last week
Alternatives and similar repositories for DeepZero
Users that are interested in DeepZero are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆43Updated this week
- Cobalt Strike BOF☆56Dec 10, 2025Updated 4 months ago
- Living of the Land of Free SaaS☆72Mar 22, 2026Updated last month
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆120Mar 24, 2026Updated last month
- Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specific…☆132May 1, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆92Feb 16, 2026Updated 2 months ago
- DSCourier is a proof-of-concept that uses the WinGet Configuration COM API to apply DSC configurations through Microsoft-signed binaries.☆181Apr 16, 2026Updated 3 weeks ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- A tool for patching/injecting code into elf binaries.☆15Sep 27, 2012Updated 13 years ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Jun 30, 2025Updated 10 months ago
- ☆95Apr 1, 2026Updated last month
- Find private tracks on soundcloud by bruteforcing shareable links☆13Apr 24, 2024Updated 2 years ago
- Linker for Beacon Object Files☆181Mar 30, 2026Updated last month
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Resolve offsets, gadgets and symbols from NTKernel☆61Jan 15, 2026Updated 3 months ago
- Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRP☆58Feb 20, 2026Updated 2 months ago
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated last year
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆17Feb 27, 2024Updated 2 years ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- Thats it! An Open-Source Windows UEFI Rootkit☆29Jul 19, 2025Updated 9 months ago
- ☆13Jan 27, 2024Updated 2 years ago
- A library for interacting with Windows through SMB written in Nim.☆17Sep 14, 2025Updated 7 months ago
- Creating attacks paths across management and data planes☆50Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- ☆11Mar 28, 2021Updated 5 years ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 3 months ago