Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.
☆229Nov 19, 2025Updated 4 months ago
Alternatives and similar repositories for from-day-zero-to-zero-day
Users that are interested in from-day-zero-to-zero-day are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆89Aug 1, 2025Updated 8 months ago
- Reverse Engineering 101 training from our Vulnerability Researcher Development Program (VRDP)☆75Jan 13, 2026Updated 2 months ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆38Mar 11, 2026Updated 3 weeks ago
- ☆26Aug 11, 2025Updated 7 months ago
- Useful scripts for tampermonkey that I used during bug hunting. Will be updated "au fil de l'eau"☆17Jun 2, 2025Updated 10 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆15Mar 17, 2025Updated last year
- ☆24Jan 27, 2026Updated 2 months ago
- ☠️ Code for the Defcon Workshop☆23Aug 6, 2024Updated last year
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Mar 31, 2026Updated last week
- Your AI javascript collaborator☆44May 16, 2025Updated 10 months ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆17Mar 22, 2023Updated 3 years ago
- ☆28Jan 6, 2024Updated 2 years ago
- Source code for the DEF CON 33 CTF Finals.☆27Aug 26, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Aug 22, 2025Updated 7 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- A C# tool for extracting information from SCCM PXE boot media.☆52Jan 14, 2026Updated 2 months ago
- ☆35Aug 30, 2024Updated last year
- Windows Thread Pool Injection Havoc Implementation☆34Mar 23, 2024Updated 2 years ago
- dEX is a powerful tool for transmitting OS command output over DNS. It is equipped with robust mechanisms for handling missing chunks, en…☆18Nov 21, 2024Updated last year
- ☆23Mar 2, 2026Updated last month
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆39Aug 5, 2025Updated 8 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Deserialization payload generator for a variety of .NET formatters☆177Dec 2, 2025Updated 4 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- Some V8 n-day exploits that I've written☆54Mar 1, 2026Updated last month
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 10 months ago
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 8 months ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆417May 21, 2025Updated 10 months ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated last year
- ☆14Jul 1, 2025Updated 9 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Slightly outdated solver for Threat Metrix anti-bot☆25Dec 11, 2025Updated 3 months ago