grepstrength.dev
Open in
urlscan Pro
162.159.152.4
Public Scan
Submitted URL: https://grepstrength.dev/
Effective URL: https://grepstrength.dev/?gi=815095e74b29
Submission: On October 28 via api from BE — Scanned from DE
Effective URL: https://grepstrength.dev/?gi=815095e74b29
Submission: On October 28 via api from BE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Open in app Sign up Sign in Write Sign up Sign in 197 Followers Follow Home Lists About Pinned grepStrength in InfoSec Write-ups HTB’S CERTIFIED PENETRATION TESTING SPECIALIST (CPTS) REVIEW ONE PART REVIEW. ONE PART THERAPY. Oct 4 41 Oct 4 41 grepStrength in System Weakness PERVASIVE AND PERSISTENT: DCSYNC ATTACKS ABUSING ACTIVE DIRECTORY USING NATIVE WINDOWS FEATURES… Sep 19 51 Sep 19 51 grepStrength in InfoSec Write-ups CERTIFIED AI/ML PENTESTER (C-AI/MLPEN) REVIEW SKYNET BETTER WATCH OUT… Aug 31 21 4 Aug 31 21 4 grepStrength in InfoSec Write-ups AS-REP ROASTING: THE CONSEQUENCE OF DISABLING KERBEROS PREAUTHENTICATION IT’S CONVENIENCE AT A COST. Aug 16 12 Aug 16 12 grepStrength in InfoSec Write-ups ’TIS A HOSTILE WORK ENVIRONMENT: WORD MALDOC ANALYSIS THE ANALYSIS OF A MALDOC PIGGYBACKING OFF THE FALLOUT OF THE GLOBAL CROWDSTRIKE OUTAGE. Aug 2 12 Aug 2 12 grepStrength in InfoSec Write-ups REVERSE ENGINEERING MY OWN MALWARE USING AI TO GET EXTRA REM PRACTICE S̶T̶R̶E̶S̶S̶-̶F̶R̶E̶E̶ WITH SLIGHTLY LESS STRESS. Jun 13 1 Jun 13 1 grepStrength in System Weakness BYPASSING AZURE OPENAI’S PROMPT SHIELD CREDIT CARDS BEWARE! Jun 13 59 Jun 13 59 grepStrength in System Weakness I SEE WHAT YOU DID THERE: SNAKEKEYLOGGER MALWARE ANALYSIS RUSTY EDITION May 21 24 May 21 24 grepStrength in InfoSec Write-ups NO DEV TEAM? NO PROBLEM: WRITING MALWARE AND ANTI-MALWARE WITH GENAI HUMAN-FREE SECURITY SOFTWARE DEVELOPMENT FOR BOTH SIDES OF THE FENCE. Apr 30 8 Apr 30 8 grepStrength in InfoSec Write-ups EXPLOITING GENERATIVE AI APPS WITH PROMPT INJECTION DAN ISN’T THE ONLY ONE IN TOWN… Apr 6 66 Apr 6 66 grepStrength in InfoSec Write-ups USING GENERATIVE AI TO PREDICT CYBERATTACKS HONEYPOTS AND LLMS, OH MY! Apr 2 7 Apr 2 7 grepStrength HOW TO GET YOUR START IN CYBERSECURITY YES, “ENTRY-LEVEL” CYBER JOBS DO EXIST. YOU JUST NEED TO KNOW WHERE TO LOOK. Dec 5, 2023 28 Dec 5, 2023 28 grepStrength in System Weakness EXPLOITING THE CRITICAL CONFLUENCE DATA CENTER AND SERVER FLAW: CVE-2023–22518 HINT: IT’S TRIVIAL. Nov 10, 2023 52 Nov 10, 2023 52 grepStrength GULOADER MALWARE ANALYSIS: TECHNICALLY STILL A NOOB EDITION FINAL ENTRY OF MY MALWARE ANALYSIS FOR THE POPULAR LOADER. Nov 9, 2023 26 Nov 9, 2023 26 grepStrength in OSINT Team WHAT A LOAD OF %$&#!: DARKGATE MALWARE ANALYSIS NOOB EDITION Oct 15, 2023 54 Oct 15, 2023 54 grepStrength in System Weakness ALL YOUR CRED ARE BELONG TO US: AGENTTESLA MALWARE ANALYSIS NOOB EDITION Oct 12, 2023 13 1 Oct 12, 2023 13 1 grepStrength GULOADER MALWARE ANALYSIS: DEFINITELY STILL A NOOB EDITION CONTINUATION OF MY BEGINNER-LEVEL MALWARE ANALYSIS ON THE POPULAR LOADER. Oct 11, 2023 4 Oct 11, 2023 4 grepStrength GULOADER MALWARE ANALYSIS: NOOB EDITION MY INITIAL ATTEMPTS AT REVERSE ENGINEERING THE POPULAR MALWARE LOADER… Oct 2, 2023 10 1 Oct 2, 2023 10 1 grepStrength in System Weakness DOUBLE PIVOTING FOR NEWBIES WITH LIGOLO-NG MOVING LATERALLY THROUGH TARGET NETWORKS CAN BE CONFUSING FOR NEWBIES. UTILIZING LIGOLO-NG CAN BRIDGE THE GAP. Aug 24, 2023 75 2 Aug 24, 2023 75 2 grepStrength in System Weakness PIVOTING FOR NEWBIES WITH LIGOLO-NG THIS IS BASICALLY A WALKTHROUGH IN HOW TO USE MY FAVORITE TOOL FOR LATERAL MOVEMENT AND NETWORK PIVOTING. Aug 21, 2023 75 3 Aug 21, 2023 75 3 GREPSTRENGTH he/him 197 Followers Intel Analyst | Security Researcher | Hacker | CPTS | GCTI | GICSP Follow Following * Tari Ibaba * sirhaxalot * Vidar Frostbjorn * Tony Chan * Dr. Ashish Bamania See all (60) Lists LANGUAGES 2 stories View All Help Status About Careers Press Blog Privacy Terms Text to speech Teams To make Medium work, we log user data. By using Medium, you agree to our Privacy Policy, including cookie policy.