Skip to content

a7t0fwa7/The-Greys

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸŽ“ The Greys: Cybersecurity Education Hub

GitHub Pages License: MIT License: CC BY 4.0 Educational Series

A comprehensive cybersecurity education platform featuring in-depth research, hands-on labs, and detection strategies across multiple security domains


🌐 Live Website

Visit the full educational site: https://a7t0fwa7.github.io/The-Greys/


πŸ“– About The Greys

The Greys is a growing collection of cybersecurity educational content designed for security professionals, researchers, and enthusiasts. Each series provides:

  • πŸ“š In-depth article series covering complete attack lifecycles
  • πŸ› οΈ Working code samples for hands-on learning
  • πŸ” Detection rules (Sigma, Sysmon, PowerShell, EDR)
  • πŸ§ͺ Lab exercises with safe testing environments
  • 🎯 Real-world scenarios and case studies
  • πŸ›‘οΈ Defensive strategies for blue teams

🎯 What You'll Learn

This platform covers multiple cybersecurity domains:

  • βœ… Attack Techniques - Understanding how attacks work
  • βœ… Detection & Hunting - Finding threats in your environment
  • βœ… Incident Response - Responding to security incidents
  • βœ… OPSEC & Evasion - Advanced adversary techniques
  • βœ… Tool Development - Building security tools
  • βœ… Forensics & Analysis - Investigating security events

πŸ“š Educational Series

πŸ” Series 1: BYOPH - Bring Your Own Protocol Handler

Status: βœ… Complete (7 parts) | Level: Intermediate | Platform: Windows

A comprehensive deep-dive into Windows protocol handler attacks, from basic concepts to advanced evasion techniques.

What You'll Learn:

  • How Windows protocol handlers work (mailto:, zoom://, custom schemes)
  • Attack techniques and persistence mechanisms
  • Detection and threat hunting strategies
  • Incident response procedures
  • Advanced OPSEC and evasion techniques

Resources:

Start Learning β†’


🚧 Coming Soon: Future Series

Series 2: Advanced Phishing Techniques (Planned)

  • Email security and analysis
  • Link obfuscation techniques
  • Credential harvesting detection
  • Anti-phishing strategies

Series 3: PowerShell Security (Planned)

  • Script analysis and deobfuscation
  • PowerShell logging and monitoring
  • Offensive PowerShell techniques
  • Detection and response

Series 4: Malware Analysis Fundamentals (Planned)

  • Static and dynamic analysis
  • Reverse engineering basics
  • Sandbox evasion techniques
  • Behavioral analysis

Series 5: Threat Hunting Methodologies (Planned)

  • Hypothesis-driven hunting
  • Data source analysis
  • Tool development
  • Hunt documentation

Want to see a specific topic? Open an issue with your suggestion!


πŸš€ Quick Start

Explore the Website

Visit The Greys Education Hub to browse all content with an easy-to-navigate interface.

Try the BYOPH Series

Prerequisites:

  • Windows 10/11 VM (isolated!)
  • Visual Studio Build Tools (optional)
  • Text editor

Quick Test:

# 1. Create VM snapshot first!

# 2. Register test handler (no admin needed)
regedit /s Articles/github-readme/BYOPH/samples/registration/register_notepad_hkcu.reg

# 3. Test it
start sample://hello-world

# 4. Cleanup
regedit /s Articles/github-readme/BYOPH/samples/registration/unregister_sample_hkcu.reg

πŸ“ Repository Structure

The-Greys/
β”œβ”€β”€ Articles/
β”‚   β”œβ”€β”€ articles/
β”‚   β”‚   β”œβ”€β”€ BYOPH/              # Series 1: Protocol handlers
β”‚   β”‚   β”œβ”€β”€ Phishing/           # Series 2: (Coming soon)
β”‚   β”‚   └── PowerShell/         # Series 3: (Coming soon)
β”‚   β”œβ”€β”€ diagrams/               # Visual attack flows
β”‚   └── github-readme/
β”‚       └── BYOPH/samples/      # Code samples & detection
β”œβ”€β”€ _config.yml                 # Jekyll configuration
β”œβ”€β”€ _layouts/                   # Custom layouts
β”œβ”€β”€ _pages/                     # Site pages
β”‚   β”œβ”€β”€ articles.md             # All series index
β”‚   β”œβ”€β”€ samples.md              # Code samples
β”‚   └── detection.md            # Detection rules
β”œβ”€β”€ index.md                    # Homepage
β”œβ”€β”€ GITHUB_PAGES_SETUP.md       # Setup instructions
└── ADDING_CONTENT_GUIDE.md     # Content creation guide

πŸŽ“ Learning Paths

πŸ”΅ Blue Team / Defenders

  1. Start with detection - Review detection rules and hunting queries
  2. Understand the threats - Read attack technique articles
  3. Deploy monitoring - Implement Sigma rules and Sysmon configs
  4. Practice hunting - Run queries in your environment
  5. Establish baselines - Document normal behavior

Recommended Series: BYOPH (detection focus), Threat Hunting (coming soon)

πŸ”΄ Red Team / Pentesters

  1. Learn the techniques - Complete full article series
  2. Practice in labs - Set up isolated environments
  3. Understand OPSEC - Study evasion and detection avoidance
  4. Get authorization - Always obtain proper permissions
  5. Document findings - Help improve defensive posture

Recommended Series: BYOPH (complete series), Advanced OPSEC (coming soon)

πŸ”¬ Security Researchers

  1. Deep dive into topics - Study complete attack chains
  2. Experiment safely - Build custom tools and techniques
  3. Develop detections - Create new detection methods
  4. Share responsibly - Contribute findings to the community
  5. Collaborate - Work with others on research

Recommended Series: All series, contribute new research

🎯 SOC Analysts

  1. Focus on detection - Master detection rules and alerts
  2. Learn attack patterns - Understand adversary techniques
  3. Practice investigation - Work through incident scenarios
  4. Build playbooks - Create response procedures
  5. Continuous learning - Stay updated on new techniques

Recommended Series: BYOPH (detection), Incident Response (coming soon)


🀝 Contributing

We welcome contributions from the security community!

Ways to Contribute:

  • πŸ“ Submit new content - Write articles or create tutorials
  • πŸ” Share detection rules - Contribute Sigma rules, Sysmon configs
  • πŸ› οΈ Add code samples - Provide working examples and tools
  • πŸ› Report issues - Found a bug or error? Let us know
  • πŸ’‘ Suggest topics - Request new series or content
  • πŸ“š Improve documentation - Fix typos, clarify explanations

Read Contributing Guidelines β†’


⚠️ Safety & Ethics

This project is STRICTLY for educational and defensive purposes:

βœ… Acceptable Use

  • Educational learning and research
  • Authorized security testing with written permission
  • Defensive security improvements
  • Academic research and publication
  • Security tool development for defense

❌ Prohibited Use

  • Unauthorized access to systems or networks
  • Malicious attacks or exploitation
  • Testing without explicit authorization
  • Illegal activities of any kind
  • Harm to individuals or organizations

The author assumes no liability for misuse of this information. Always:

  • πŸ”’ Test only in isolated lab environments
  • πŸ“ Obtain written authorization before testing production systems
  • πŸ›‘οΈ Follow responsible disclosure practices
  • βš–οΈ Comply with all applicable laws and regulations

πŸ“œ License

This repository uses a dual-license approach:

Code & Software β†’ MIT License

All code, scripts, detection rules, and technical implementations are licensed under the MIT License.

See: LICENSE-CODE

Educational Content β†’ Creative Commons BY 4.0

All articles, documentation, diagrams, and educational materials are licensed under Creative Commons Attribution 4.0 International (CC BY 4.0).

See: LICENSE-CONTENT

Quick Summary

What License Can I use commercially? Attribution required?
Code, Scripts, Detection Rules MIT βœ… Yes ⚠️ Include copyright notice
Articles, Docs, Diagrams CC BY 4.0 βœ… Yes ⚠️ Give credit to author

For detailed guidance: See LICENSING.md

Questions? Open an issue on GitHub


⚠️ Educational Use Disclaimer: All content is provided for educational and authorized security testing purposes only. The author assumes no liability for misuse.


πŸ“ž Contact & Community

Get in Touch

Stay Updated

  • ⭐ Star this repository to get notifications
  • πŸ‘οΈ Watch for new content releases
  • πŸ”” Follow for updates on new series

πŸ”– Topics Covered

#Cybersecurity #InfoSec #BlueTeam #RedTeam #WindowsSecurity #ThreatHunting #BYOPH #SecurityResearch #PenTesting #IncidentResponse #Malware #Forensics #Detection #SIEM #EDR #SOC


πŸ“Š Repository Stats

  • Series Published: 1 (BYOPH - Complete)
  • Series Planned: 4+ (Phishing, PowerShell, Malware Analysis, Threat Hunting)
  • Total Articles: 7+ (Growing)
  • Detection Rules: Sigma, Sysmon, PowerShell, EDR
  • Code Samples: Handlers, Scripts, Tools
  • Lab Exercises: Multiple hands-on scenarios

⚑ Educational Use Only

Always test in isolated environments. Obtain authorization before security testing.

Building a safer digital world through education and collaboration.


GitHub Pages

About

Personal Blog Postings on Cyber topics

Resources

License

Unknown and 2 other licenses found

Licenses found

Unknown
LICENSE
Unknown
LICENSE-CODE
Unknown
LICENSE-CONTENT

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors