Greycel's repositories
WordKnock
Add tracking hidden image to Word documents
unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
luckystrike
A PowerShell based utility for the creation of malicious Office macro documents.
bug-bounty-reference
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
cheatsheets
Command line cheatsheets
IntruderPayloads
A collection of Burpsuite Intruder payloads, fuzz lists and file uploads
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
mothereff.in
Web developer tools
Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
bugbounty-cheatsheet
A list of interesting payloads, tips and tricks.
AWSBucketDump
Security Tool to Look For Interesting Files in S3 Buckets
awesome-bug-bounty
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
bugcrowd-levelup-subdomain-enumeration
This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtual conference
awesome-web-security
🐶 A curated list of Web Security materials and resources.
fuzzdb
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
wfuzz
Web application fuzzer
awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
hunt-detect-prevent
Lists of sources and utilities utilized to hunt, detect and prevent evildoers.
yarGen
yarGen is a generator for YARA rules
Malware
Course materials for Malware Analysis by RPISEC
Probable-Wordlists
Wordlists sorted by probability originally created for password generation and testing
SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
Automated-Malware-Analysis-List
My personal Automated Malware Analysis Sandboxes and Services
tools
security and hacking tools, exploits, proof of concepts, shellcodes, scripts
isthisipbad
Python Script to Check IP Against Blacklist
malware-1
Malware Samples. Uploaded to GitHub for those want to analyse the code.
Threat_Intelligence
Threat-Intelligence Feeds & Tools & Frameworks