D3epDiv3r
CompTIA Security+ | MSc Cybersecurity Management | BSc (Hons) First Class in Ethical Hacking and Cybersecurity
United Kingdom
Pinned Repositories
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
ARP-Spoofer
A simple ARP Spoofing tool.
Auto-GPT
An experimental open-source attempt to make GPT-4 fully autonomous.
Auto_Tor_IP_changer
change your Ip address automatically This tool based on tor project
Block-Site
A browser extension to block website access using hostname matching
breach-parse
A tool for parsing breached passwords
D3epDiv3r
Email-scrapper
A simple email web scrapper in Python
Filesystem-Monitoring
Basic Filesystem or Directory Monitoring tool for Windows built using Python's API library "Watchdog".
gef-legacy
Legacy version of GEF running for GDB+Python2
D3epDiv3r's Repositories
D3epDiv3r/D3epDiv3r
D3epDiv3r/gef-legacy
Legacy version of GEF running for GDB+Python2
D3epDiv3r/Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
D3epDiv3r/Auto-GPT
An experimental open-source attempt to make GPT-4 fully autonomous.
D3epDiv3r/Auto_Tor_IP_changer
change your Ip address automatically This tool based on tor project
D3epDiv3r/Block-Site
A browser extension to block website access using hostname matching
D3epDiv3r/COMSM0049
Systems and Software Security
D3epDiv3r/CryptoCat-Pwn-Binary_Exploitation
CTF chall write-ups, files, scripts etc (trying to be more organised LOL)
D3epDiv3r/CTFd
CTFs as you need them
D3epDiv3r/Flipper-Zero-BadUSB
Repository for my flipper zero badUSB payloads. Now almost entirely plug and play.
D3epDiv3r/fud-backdoor
Create a fully undetectable backdoor with simple steps.
D3epDiv3r/GeoSpy
GeoSpy is an OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services and control their users
D3epDiv3r/GodGenesis
A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
D3epDiv3r/hak5-submissions
This is a collection of my pentesting scripts I have come up with
D3epDiv3r/HowToHunt
Collection of methodology and test case for various web vulnerabilities.
D3epDiv3r/libc-database
Build a database of libc offsets to simplify exploitation
D3epDiv3r/MAC_address_changer
A simple tool built to change the MAC address
D3epDiv3r/maskphish
Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
D3epDiv3r/MHDDoS
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
D3epDiv3r/ohmyzsh
🙃 A delightful community-driven (with 2,000+ contributors) framework for managing your zsh configuration. Includes 300+ optional plugins (rails, git, macOS, hub, docker, homebrew, node, php, python, etc), 140+ themes to spice up your morning, and an auto-update tool so that makes it easy to keep up with the latest updates from the community.
D3epDiv3r/pagodo
pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching
D3epDiv3r/password_cracker
A simple password hash cracker
D3epDiv3r/password_sniffer
A simple network password sniffer
D3epDiv3r/portscanner
A basic port scanner
D3epDiv3r/PowerShell-for-Hackers
This repository is a collection of powershell functions every hacker should know
D3epDiv3r/Python-keylogger
A basic Python keylogger
D3epDiv3r/remenissions
D3epDiv3r/sherlock
🔎 Hunt down social media accounts by username across social networks
D3epDiv3r/ssh_bruteforce_python
A basic SSH brute force tool in Python
D3epDiv3r/Ubers-SD-Files
These are all of the SD card assets you need for your Flipper Zero!