Skip to content
View Zerx0r's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Zerx0r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
12 stars written in C++
Clear filter

Powerful yet simple to use screenshot software 🖥️ 📸

C++ 27,945 1,771 Updated Oct 7, 2025

Reverse engineering focusing on x64 Windows.

C++ 5,502 547 Updated Sep 10, 2025

Open EDR public repository

C++ 2,533 489 Updated Jan 13, 2024

Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.

C++ 1,470 245 Updated Oct 9, 2025

Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes

C++ 1,022 168 Updated Jun 20, 2023

Loading Remote AES Encrypted PE in memory , Decrypted it and run it

C++ 985 200 Updated Aug 29, 2023

Brand New Code Injection for Windows

C++ 740 266 Updated Oct 7, 2020

An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer

C++ 519 78 Updated Feb 13, 2024

Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA …

C++ 425 81 Updated Aug 14, 2025

Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls

C++ 379 62 Updated Oct 8, 2024

Use hardware breakpoint to dynamically change SSN in run-time

C++ 269 36 Updated Apr 10, 2024

A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.

C++ 197 35 Updated Dec 27, 2023