Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.
☆220Nov 19, 2025Updated 4 months ago
Alternatives and similar repositories for from-day-zero-to-zero-day
Users that are interested in from-day-zero-to-zero-day are comparing it to the libraries listed below
Sorting:
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆89Aug 1, 2025Updated 7 months ago
- Reverse Engineering 101 training from our Vulnerability Researcher Development Program (VRDP)☆69Jan 13, 2026Updated 2 months ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆36Mar 11, 2026Updated last week
- ☆26Aug 11, 2025Updated 7 months ago
- ☆15Mar 17, 2025Updated last year
- ☆23Jan 27, 2026Updated last month
- ☠️ Code for the Defcon Workshop☆23Aug 6, 2024Updated last year
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Aug 3, 2025Updated 7 months ago
- Your AI javascript collaborator☆44May 16, 2025Updated 10 months ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆15Mar 22, 2023Updated 2 years ago
- ☆14Aug 22, 2025Updated 6 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- A C# tool for extracting information from SCCM PXE boot media.☆51Jan 14, 2026Updated 2 months ago
- ☆35Aug 30, 2024Updated last year
- Windows Thread Pool Injection Havoc Implementation☆34Mar 23, 2024Updated last year
- ☆23Mar 2, 2026Updated 2 weeks ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆37Aug 5, 2025Updated 7 months ago
- Deserialization payload generator for a variety of .NET formatters☆177Dec 2, 2025Updated 3 months ago
- Library for Hackers☆28Oct 8, 2024Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆85Aug 13, 2024Updated last year
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- Some V8 n-day exploits that I've written☆52Mar 1, 2026Updated 2 weeks ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 10 months ago
- Local SYSTEM auth trigger for relaying☆170Jul 22, 2025Updated 7 months ago
- My software engineering notes.☆24Nov 12, 2025Updated 4 months ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆403May 21, 2025Updated 10 months ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 11 months ago
- ☆14Jul 1, 2025Updated 8 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Execute commands, in/exfiltrate files using your custom RPC Server☆66Jan 13, 2026Updated 2 months ago