Giter Club home page Giter Club logo

Hi šŸ‘‹, I'm ZDAY-X

Full Stack Developer and Reverse Engineer

Fight For Your Privacy!

gitvid

Lets fight together!

decept

Connect with me:

Languages and Tools:

android bash blender c csharp css3 django dotnet figma git go heroku html5 illustrator javascript kotlin linux mysql opencv openresty pandas photoshop python qt rust selenium xd

zday-x

Ā zday-x

ZeroDay-X's Projects

ardupilot icon ardupilot

ArduPlane, ArduCopter, ArduRover, ArduSub source

baapgattack icon baapgattack

Unlimited Call+SMS Attack By BaapG it's Very Dangerous So Don't Use Your Own Number. Call+SMS Bombing TermuX SMS+Call Bomber

beast_bomber icon beast_bomber

SMS bomber, email spammer, WhatsApp spammer, Telegram spammer, Discord spammer and DoS attacker. Supported platforms: Windows, Linux, MacOS, Termux

conti-ransomware icon conti-ransomware

Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentionally introduced by the leaker to prevent the locker from being built. The Queue header file which implements a few linked list data structures that Conti uses for task scheduling in the Threadpool had several missing commas, there are still errors which I believe to be the result of a missing #ifdef pre-processsor macro in one of the header files but haven't had time to find it. Will be uploading English Translated Documentation In the future

dainsleif icon dainsleif

:zap: An open source hack tool for CSGO that empowers you.

dcrat icon dcrat

A simple remote tool in C#.

ddos-ripper icon ddos-ripper

DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic

ddos-scripts icon ddos-scripts

This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.

deathsleep icon deathsleep

A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.

defeat-defender-v1.2 icon defeat-defender-v1.2

Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC

detours icon detours

Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.

figaro icon figaro

Real-time voice-changer for voice-chat, etc. Will support many different voice-filters and features in the future. šŸŽµ

hackbgrt icon hackbgrt

Windows boot logo changer for UEFI systems

hazard-nuker icon hazard-nuker

A discord token nuker With loads of options that will screw an account up real bad, also has inbuilt massreport, GroupChat Spammer and Token/Password/Creditcard grabber and so much more!

inlineexecute-assembly icon inlineexecute-assembly

InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module

insta-gen icon insta-gen

A Tool To Automate Creating Instagram Accounts.

insta-mail icon insta-mail

Generate Temporary Mail And Automatically Get OTP For Instagram.

instagram-followers-bot icon instagram-followers-bot

A bot for Instagram. You can follow users using a tag or in a specific location, unfollow those who dont follow-you-back, and follow-back those who follow you

jpgtomalware icon jpgtomalware

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

jspybridge icon jspybridge

šŸŒ‰. Bridge to interoperate Node.js and Python

kivymd icon kivymd

Set of widgets for Kivy inspired by Google's Material Design.

lively icon lively

Free and open-source software that allows users to set animated desktop wallpapers and screensavers.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    šŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. šŸ“ŠšŸ“ˆšŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ā¤ļø Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.