GreySec-Security-Forums / Community-Articles
Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excellence.
☆25Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Community-Articles
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆13Updated last month
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 2 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- ☆10Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆36Updated 2 years ago
- pwncat windows c2 components☆17Updated 3 years ago
- A collection of Vulnerable Windows Drivers☆16Updated 2 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- My nim learning experiments☆11Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- ☆12Updated 2 years ago
- ☆14Updated 9 months ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆26Updated 2 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 3 years ago
- Handy script to automate the attack☆19Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- ☆34Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- miscellaneous sploit scripts/hacks☆14Updated 4 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago