GreySec-Security-Forums / Community-Articles
Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excellence.
☆24Updated 3 years ago
Related projects: ⓘ
- ☆11Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- pwncat windows c2 components☆17Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆17Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 2 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- miscellaneous sploit scripts/hacks☆13Updated 2 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- ☆22Updated 2 years ago
- ☆30Updated last year
- ☆14Updated 7 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- ☆19Updated this week
- Shell hunter for AF☆34Updated 2 years ago
- Red Team Projects with chat.openai.com.☆16Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆8Updated 8 years ago
- powershell tool for VM evasion☆43Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆14Updated 4 years ago
- ☆22Updated this week
- ☆12Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- ☆16Updated 2 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆19Updated 3 years ago