Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excellence.
☆27Aug 17, 2021Updated 4 years ago
Alternatives and similar repositories for Community-Articles
Users that are interested in Community-Articles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- SMTP honeypot written in Golang☆33Aug 9, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- ☆12Nov 22, 2024Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Sep 2, 2018Updated 7 years ago
- Tools and information about RingZer0CTF.com☆11Jul 21, 2023Updated 2 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27May 25, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- govenom is a msfvenom-inspired cross-platform payload generator toolkit written in Go☆21Sep 9, 2020Updated 5 years ago
- PoC for old Binder vulnerability (based on P0 exploit)☆14Oct 27, 2020Updated 5 years ago
- PoC CVE-2020-6308☆38Dec 29, 2020Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- Simple python script for AD enumeration☆31Apr 5, 2021Updated 5 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Automatically spawn a reverse shell fully interactive for Linux or Windows victim☆356Apr 15, 2023Updated 2 years ago
- Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.☆19Jan 3, 2017Updated 9 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- Package manager for hackers built by hackers☆37Aug 31, 2018Updated 7 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 4 months ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- ☆59Nov 13, 2024Updated last year
- ☆21Jul 27, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Code for the solutions of practical reverse engineering☆23Jan 17, 2020Updated 6 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Jul 10, 2022Updated 3 years ago
- Platform independent Near Field Communication (NFC) library☆28Jan 22, 2021Updated 5 years ago
- Windows Exploit List☆17Jun 13, 2019Updated 6 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last month