GreySec-Security-Forums / Community-Articles
Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excellence.
☆27Updated 3 years ago
Alternatives and similar repositories for Community-Articles:
Users that are interested in Community-Articles are comparing it to the libraries listed below
- ☆33Updated 2 years ago
- ☆11Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- ☆54Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- miscellaneous sploit scripts/hacks☆15Updated last month
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Basic Dart reverse shell code☆21Updated last year
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆26Updated 2 years ago
- ☆24Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆28Updated 5 years ago
- ☆36Updated last week
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago