GreySec-Security-Forums / Community-Articles
Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excellence.
☆27Updated 3 years ago
Alternatives and similar repositories for Community-Articles
Users that are interested in Community-Articles are comparing it to the libraries listed below
Sorting:
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Updated 7 months ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- ☆12Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27Updated 2 years ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- A simple injector that uses LoadLibraryA☆18Updated 4 years ago
- Windows 权限提升 BadPotato☆13Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- My nim learning experiments☆11Updated 2 years ago
- ☆18Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- ☆14Updated 3 years ago