Skip to content
View Z3r0S3v3n's full-sized avatar

Block or report Z3r0S3v3n

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Practical labs, notes, and reports for CEH v13 modules — covering web hacking, network pentesting, malware analysis, social engineering, and security tool usage.

96 22 Updated Jan 28, 2026

HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug b…

Python 1 Updated Sep 19, 2025

Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.

C# 291 57 Updated May 2, 2025

Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router

Python 30 8 Updated Oct 16, 2025

Generate Brainrot Content with Python for TikTok, Instagram and YouTube

Python 91 20 Updated May 13, 2025

Best DDoS attack simulation environment with comprehensive attack vectors, AI service targeting, and fully customizable botnet topologies. Research, test, and visualize modern DDoS attacks in a con…

Python 10 Updated Apr 6, 2025

SD Web UI Extension for Run Command Manually

Python 6 6 Updated Feb 27, 2023

Invoke is a leading creative engine for Stable Diffusion models, empowering professionals, artists, and enthusiasts to generate and create visual media using the latest AI-driven technologies. The …

TypeScript 27,012 2,808 Updated Apr 19, 2026

Stable Diffusion web UI

Python 162,451 30,277 Updated Mar 2, 2026

Learn the fundamentals of cloud computing

HTML 134 9 Updated Dec 6, 2022

An OOB interaction gathering server and client library

Go 4,280 455 Updated Apr 6, 2026

OS Command Injection Vulnerability Payload List

58 23 Updated Feb 23, 2021

exploit for CVE-2022-2588

C 488 71 Updated Mar 4, 2023

CVE-2022-2639 Linux kernel openvswitch local privilege escalation

C 110 49 Updated Sep 5, 2022

Bypass firewall for traffic forwarding using webshell

Python 1,429 205 Updated Sep 29, 2021

This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads

Python 84 22 Updated Aug 23, 2020

sshchecker is a fast dedicated ssh brute-forcing tool to check ssh login on the giving IP list.

Go 23 7 Updated Feb 8, 2026

Exploits | MIRAI AND SCANNERS | Layer4 Methods | Layer7 Methods | UDP METHODS | TCP METHODS | BRUTERS | VULN | LISTS

JavaScript 67 26 Updated Aug 2, 2024

Una recopilacion de botnets, para poder analizarlas

C 2 4 Updated Oct 14, 2021

A Simple Multi-Threaded SSH Brute Forcer

Python 279 108 Updated Apr 15, 2020

Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.

Python 33 6 Updated Oct 15, 2019

socks5 proxy server in C

C 229 65 Updated Jun 12, 2019

Declarative Continuous Deployment for Kubernetes

Go 22,642 7,083 Updated Apr 19, 2026

Cyber Security ALL-IN-ONE Platform

TypeScript 7,178 792 Updated Apr 17, 2026

JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps v…

Java 936 173 Updated Sep 2, 2025

A Simple Linux ELF Runtime Crypter

Go 273 56 Updated Feb 25, 2025

OpenBullet2Python using code from OpenBullet

Python 51 16 Updated Mar 21, 2024

Various tips & tricks

Shell 3,815 471 Updated Mar 25, 2026

🌍 Decentralized, peer-to-peer and secure overlay networks

Lua 505 28 Updated Jul 2, 2019
Next