Git Product home page Git Product logo

Redefining Cybersecurity at Zero-Defense Labs.

Hey there, I'm Jacob, aka kobs0N πŸ‘‹

πŸ₯· CTO & Cybersecurity Enthusiast at Zero-Defense Labs - Securing the Digital Frontier!πŸ₯·

πŸš€ The Mission

At Zero-Defense Labs, We stand as your unyielding shield in the digital battlefield.
πŸ›‘οΈIn an environment where hackers only need to succeed once,πŸ‘Ύ there's no room for second chances.

Our unwavering determination drives us to excel at identifying and eradicating vulnerabilities, empowering you to confront and conquer every threat head-on.

πŸ‘‰ Let's work together to bolster digital security and make the internet a fortress for all. βœ”οΈ

πŸ‘‡ Join me in our journey to fortify the digital realm. πŸ•΅

Twitter LinkedIn Email

therealwolf's Projects

scarecrow icon scarecrow

ScareCrow - Payload creation framework designed around EDR bypass.

seclists icon seclists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

secretx icon secretx

Extracting api keys and secrets by requesting each url at the your list.

smuc icon smuc

Simplified MITRE Use Cases, it describes the Attack and Detection

starkiller icon starkiller

Starkiller is a Frontend for PowerShell Empire.

subjack icon subjack

Hostile Subdomain Takeover tool written in Go

tfnp icon tfnp

Techniques For Network Ports

thefatrat icon thefatrat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software

tinyinst icon tinyinst

A lightweight dynamic instrumentation library

tools-tbhm icon tools-tbhm

Tools of "The Bug Hunters Methodology V2 by @jhaddix"

training icon training

Training materials crafted and publicly provided by Red Naga members

useful_websites_for_pentester icon useful_websites_for_pentester

This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day studies and to remain updated.

vdr icon vdr

Vulnerable driver research tool, result and exploit PoCs

winafl icon winafl

A fork of AFL for fuzzing Windows binaries

windows-exploit-suggester icon windows-exploit-suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.

windows-post-exploitation icon windows-post-exploitation

Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.