Skip to content
View deepzec's full-sized avatar

Block or report deepzec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Gather and update all available and newest CVEs with their PoC.

HTML 6,522 830 Updated Oct 20, 2024

State of the art faster Transformer with Tensorflow 2.0 ( NLP, Computer Vision, Audio ).

Jupyter Notebook 85 2 Updated Mar 16, 2023

This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)

Python 635 173 Updated Oct 21, 2019

A JavaScript library aimed at visualizing graphs of thousands of nodes and edges

TypeScript 11,249 1,588 Updated Oct 14, 2024

A simple bash script to Obfuscate | De-Obfuscate bulk malicious domain list

Shell 6 2 Updated Jul 29, 2018

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Go 10,799 1,947 Updated Aug 21, 2024

An open-source post-exploitation framework for students, researchers and developers.

Python 8,964 2,124 Updated Aug 25, 2024

Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.

Python 201 68 Updated Feb 15, 2024

DNS Rebinding Exploitation Framework

JavaScript 481 71 Updated Apr 27, 2021

This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.

9,050 2,191 Updated Sep 1, 2024

The goal of this repository is to document the most common techniques to bypass AppLocker.

PowerShell 1,906 351 Updated Sep 11, 2023
Python 707 193 Updated Oct 28, 2022

Quickly analyze and reverse engineer Android packages

Shell 733 165 Updated Dec 21, 2022

ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.

JavaScript 2,286 504 Updated Oct 8, 2024

Curated list of public penetration test reports released by several consulting firms and academic security groups

C 7 4 Updated Nov 2, 2019

Netflow is a key component for network traffic monitoring. As high speed technologies such as 10 Gbps or 40 Gbps links are common in a backbone network, it is impossible to monitor traffic via conv…

C 21 23 Updated Apr 15, 2015

Post-exploitation tool for hiding processes from monitoring applications

C++ 703 173 Updated Jun 18, 2023

TensorFlow Tutorial and Examples for Beginners (support TF v1 & v2)

Jupyter Notebook 43,392 14,938 Updated Jul 26, 2024

🔥 A powerful MongoDB auditing and pentesting tool 🔥

Python 1,319 135 Updated Apr 17, 2023

VMware Escape Exploit before VMware WorkStation 12.5.5

C 908 351 Updated Nov 7, 2023

CVE-2018-8120 Windows LPE exploit

C++ 494 190 Updated May 30, 2018

Collection of things made during my preparation to take on OSCE

Python 188 85 Updated Feb 24, 2022

Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.

Python 3,908 607 Updated Aug 2, 2024

A list of interesting payloads, tips and tricks for bug bounty hunters.

5,842 1,540 Updated Sep 14, 2023

A curated list of Artificial Intelligence (AI) courses, books, video lectures and papers.

10,767 1,808 Updated Jun 20, 2024

Arbitrary code execution with kernel privileges using CVE-2018-8897.

C++ 410 112 Updated May 18, 2018

Reverse Shell as a Service

JavaScript 1,843 234 Updated Jan 22, 2024
Next