grepstrength.dev Open in urlscan Pro
162.159.152.4  Public Scan

Submitted URL: https://grepstrength.dev/
Effective URL: https://grepstrength.dev/?gi=815095e74b29
Submission: On October 28 via api from BE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Open in app

Sign up

Sign in

Write


Sign up

Sign in



197 Followers

Follow


Home

Lists

About



Pinned

grepStrength

in

InfoSec Write-ups


HTB’S CERTIFIED PENETRATION TESTING SPECIALIST (CPTS) REVIEW


ONE PART REVIEW. ONE PART THERAPY.

Oct 4
41


Oct 4
41



grepStrength

in

System Weakness


PERVASIVE AND PERSISTENT: DCSYNC ATTACKS


ABUSING ACTIVE DIRECTORY USING NATIVE WINDOWS FEATURES…

Sep 19
51


Sep 19
51



grepStrength

in

InfoSec Write-ups


CERTIFIED AI/ML PENTESTER (C-AI/MLPEN) REVIEW


SKYNET BETTER WATCH OUT…

Aug 31
21
4


Aug 31
21
4



grepStrength

in

InfoSec Write-ups


AS-REP ROASTING: THE CONSEQUENCE OF DISABLING KERBEROS PREAUTHENTICATION


IT’S CONVENIENCE AT A COST.

Aug 16
12


Aug 16
12



grepStrength

in

InfoSec Write-ups


’TIS A HOSTILE WORK ENVIRONMENT: WORD MALDOC ANALYSIS


THE ANALYSIS OF A MALDOC PIGGYBACKING OFF THE FALLOUT OF THE GLOBAL CROWDSTRIKE
OUTAGE.

Aug 2
12


Aug 2
12



grepStrength

in

InfoSec Write-ups


REVERSE ENGINEERING MY OWN MALWARE


USING AI TO GET EXTRA REM PRACTICE S̶T̶R̶E̶S̶S̶-̶F̶R̶E̶E̶ WITH SLIGHTLY LESS
STRESS.

Jun 13
1


Jun 13
1



grepStrength

in

System Weakness


BYPASSING AZURE OPENAI’S PROMPT SHIELD


CREDIT CARDS BEWARE!

Jun 13
59


Jun 13
59



grepStrength

in

System Weakness


I SEE WHAT YOU DID THERE: SNAKEKEYLOGGER MALWARE ANALYSIS


RUSTY EDITION

May 21
24


May 21
24



grepStrength

in

InfoSec Write-ups


NO DEV TEAM? NO PROBLEM: WRITING MALWARE AND ANTI-MALWARE WITH GENAI


HUMAN-FREE SECURITY SOFTWARE DEVELOPMENT FOR BOTH SIDES OF THE FENCE.

Apr 30
8


Apr 30
8



grepStrength

in

InfoSec Write-ups


EXPLOITING GENERATIVE AI APPS WITH PROMPT INJECTION


DAN ISN’T THE ONLY ONE IN TOWN…

Apr 6
66


Apr 6
66



grepStrength

in

InfoSec Write-ups


USING GENERATIVE AI TO PREDICT CYBERATTACKS


HONEYPOTS AND LLMS, OH MY!

Apr 2
7


Apr 2
7



grepStrength


HOW TO GET YOUR START IN CYBERSECURITY


YES, “ENTRY-LEVEL” CYBER JOBS DO EXIST. YOU JUST NEED TO KNOW WHERE TO LOOK.

Dec 5, 2023
28


Dec 5, 2023
28



grepStrength

in

System Weakness


EXPLOITING THE CRITICAL CONFLUENCE DATA CENTER AND SERVER FLAW: CVE-2023–22518


HINT: IT’S TRIVIAL.

Nov 10, 2023
52


Nov 10, 2023
52



grepStrength


GULOADER MALWARE ANALYSIS: TECHNICALLY STILL A NOOB EDITION


FINAL ENTRY OF MY MALWARE ANALYSIS FOR THE POPULAR LOADER.

Nov 9, 2023
26


Nov 9, 2023
26



grepStrength

in

OSINT Team


WHAT A LOAD OF %$&#!: DARKGATE MALWARE ANALYSIS


NOOB EDITION

Oct 15, 2023
54


Oct 15, 2023
54



grepStrength

in

System Weakness


ALL YOUR CRED ARE BELONG TO US: AGENTTESLA MALWARE ANALYSIS


NOOB EDITION

Oct 12, 2023
13
1


Oct 12, 2023
13
1



grepStrength


GULOADER MALWARE ANALYSIS: DEFINITELY STILL A NOOB EDITION


CONTINUATION OF MY BEGINNER-LEVEL MALWARE ANALYSIS ON THE POPULAR LOADER.

Oct 11, 2023
4


Oct 11, 2023
4



grepStrength


GULOADER MALWARE ANALYSIS: NOOB EDITION


MY INITIAL ATTEMPTS AT REVERSE ENGINEERING THE POPULAR MALWARE LOADER…

Oct 2, 2023
10
1


Oct 2, 2023
10
1



grepStrength

in

System Weakness


DOUBLE PIVOTING FOR NEWBIES WITH LIGOLO-NG


MOVING LATERALLY THROUGH TARGET NETWORKS CAN BE CONFUSING FOR NEWBIES. UTILIZING
LIGOLO-NG CAN BRIDGE THE GAP.

Aug 24, 2023
75
2


Aug 24, 2023
75
2



grepStrength

in

System Weakness


PIVOTING FOR NEWBIES WITH LIGOLO-NG


THIS IS BASICALLY A WALKTHROUGH IN HOW TO USE MY FAVORITE TOOL FOR LATERAL
MOVEMENT AND NETWORK PIVOTING.

Aug 21, 2023
75
3


Aug 21, 2023
75
3





GREPSTRENGTH

he/him
197 Followers

Intel Analyst | Security Researcher | Hacker | CPTS | GCTI | GICSP

Follow

Following

 * Tari Ibaba
   
   

 * sirhaxalot
   
   

 * Vidar Frostbjorn
   
   

 * Tony Chan
   
   

 * Dr. Ashish Bamania
   
   

See all (60)

Lists




LANGUAGES

2 stories

View All

Help

Status

About

Careers

Press

Blog

Privacy

Terms

Text to speech

Teams

To make Medium work, we log user data. By using Medium, you agree to our Privacy
Policy, including cookie policy.