GreySec-Security-Forums / Community-ArticlesLinks
Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excellence.
☆27Updated 3 years ago
Alternatives and similar repositories for Community-Articles
Users that are interested in Community-Articles are comparing it to the libraries listed below
Sorting:
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Sp00fer blog post -☆26Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- pwncat windows c2 components☆19Updated 4 years ago
- ☆12Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- powershell tool for VM evasion☆42Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- ☆16Updated 2 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- ☆18Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆23Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Sources code extracted from malwares for analysis☆38Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- ☆12Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- ☆24Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago