- zines (el8, zf0, AB, pHc, etc)
- books (programming and exploitation)
- irc.grepnet.org +6697 /join #chats
Who we are
We are a group of users who value the quality of content sent through the world of security, and even more-so, the lack thereof. Collectively, we plan to establish a wide variety of users who can collaborate and build projects, engage in programming discussions (with an open mind), and everything in between. We love everything tech.
Where we came from
A bit of a long story, but essentially we're from a server called voidptr with me, betamonkey and MalwareTech (Marcus Hutchins) as opers running the network. When TouchMe aka MalwareTech aka TouchMyMalware creator (saw him put it into production and move around as iarkey on hackforums) built his own ircd because we wouldn't ban w0ne/bosko for annoying him and betamonkey didn't want bans, so TouchMe made MalwareTech, and we created what was known as Netkings/ZeroSec (rebel/BooZer). Betamonkey of voidptr came to me and asked if we could merge because I took all the users and more since I was on 20 IRC networks at once. We merged with voidptr, hiddenirc, hardchats.xxx, teamp0ison, siph0n, and pivoted off what was left from the old BlueHell bottalk users. We come from a long line of scenes with a wide diversity of skill-sets on a multitude of architectures.
Next up is building a black lab where we can do live penetration testing underneath a dedicated server running Proxmox with KVM droplets of Kali, Parrot OS, vulnerable versions of kernels and apps, while doing live exploitation in a controlled environment for educational value on the effect and how it all runs down off the back-end. We can hand out shells and have images on standby in-case anyone wants to act childish and get their shell access removed. Ultimately, we just want to learn more and run our own pipeline for like-minded individuals to excel in various aspects of computing.
Penetration test us
Feel free to run a pen-test on anything you'd like with grepNET, as long as you paste the results or show the effect in our live environment. We're open to being hacked, as we can have this all back up in seconds. All of us have done this for quite a while, so some new eyes on our project would be amazing, just bring valuable feedback.
Tips and updates
If you have any ideas, feel free to add them underneath as I'll throw anything that makes sense into production. In the end, this will be the best place to request grepNET to make updates and build on what we have.
// Brought to you by firstname.lastname@example.org