Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ _mohemiv, Arseniy Sharoglazov ]

πŸ”₯ I've created a new Twitter account: @OffensiveTg

This account will try to share useful posts from Telegram or other non-Twitter sources.

🍏 May be run by the community later, and/or automation might be added.

πŸ”— https://twitter.com/offensivetg

πŸ₯ [ tweet ]

ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ рСкурсии!
πŸ‘Ž1
😈 [ akaclandestine, Clandestine ]

GitHub - khast3x/Redcloud: Automated Red Team Infrastructure deployement using Docker https://t.co/FPivhR11Fo

πŸ”— https://github.com/khast3x/Redcloud

πŸ₯ [ tweet ]
😈 [ _Kudaes_, Kurosh Dabbagh ]

Elevator (UAC bypass) is finally released: https://t.co/nuVm6aAFus. One of the most curious UAC bypasses that I've ever seen, and also it works like a charm. Give it a try and send me your feedback!

πŸ”— https://github.com/Kudaes/Elevator

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Harvesting Active Directory Credentials via HTTP Request Smuggling https://t.co/SYQVpKJ5WO

πŸ”— https://northwave-security.com/harvesting-active-directory-credentials-via-http-request-smuggling/

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ zux0x3a, Lawrence ε‹žε€«ζ–― ]

the beta version of https://t.co/X6JcXARx0u is live; what inside
βœ… online wiki in terminal style made for red teamers
βœ… can search for a specific topic (.e.g search "pass the hash")
βœ… you can look up specific modules for specific command line (e.g lookup mimikatz "golden")

πŸ”— http://terminal.ired.dev

πŸ₯ [ tweet ]
😈 [ embee_research, Matthew ]

In depth analysis of a 6-stage #asyncrat #malware loader using #cyberchef + #dnspyπŸ€

Persistent .lnk -> .py script -> 2nd .py script -> .NET DLL (reflection) -> .NET DLL (injected into msbuild.exe) -> .NET dll (custom obfuscation) -> .NET .exe (asyncrat)

https://t.co/e2Y5jHOOYy

πŸ”— https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader

πŸ₯ [ tweet ]
😈 [ pentest_swissky, Swissky @ Home  ]

Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection
https://t.co/oUz0tt5T6x

πŸ”— https://www.huntress.com/blog/hackers-no-hashing-randomizing-api-hashes-to-evade-cobalt-strike-shellcode-detection

πŸ₯ [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Awesome talk by @thefLinkk for all those interested in malware dev πŸ‘:
https://t.co/7BGEVSMiiX

Plus the tool release Lastenzug/SpiderPIC, used that just today and it works like a charm. No socks module in your C2? This can be used as burnable standalone shellcode πŸ”₯ really cool!

πŸ”— https://m.youtube.com/watch?v=AucQUjJBJuw&list=PL7ZDZo2Xu332DOLSQlWlJPWRRAlpsLZQ-&index=12

πŸ₯ [ tweet ]
πŸ”₯1
πŸ”₯2
😈 [ N4k3dTurtl3, NA ]

My first blog post on our new team website is up. Walking through manually reversing an undocumented struct and getting sleep obfuscation to work in CFG protected processes using NT calls.

https://t.co/BuRWSRwQPi

πŸ”— https://icebreaker.team/blogs/sleeping-with-control-flow-guard/

πŸ₯ [ tweet ]
😈 [ n00py1, n00py ]

"Relaying from SMB to the LDAP service ... requires an attacker to specify the –remove-mic flag ... This allows relaying from SMB to the LDAP service to work since NTLMv1 doesn’t include a message integrity code (MIC)."
https://t.co/1o7d6DquoL
@praetorianlabs

πŸ”— https://www.praetorian.com/blog/ntlmv1-vs-ntlmv2/

πŸ₯ [ tweet ]
😈 [ mrgretzky, Kuba Gretzky ]

I've just published a new blog post about Discord account hacks in the wild, using JavaScript injection through bookmarklets. I try to propose guidelines to mitigate these kind of attacks.

Thanks to @zh4ck and @buherator for inspiration and ideas!

https://t.co/amkC0Ty09d

πŸ”— https://breakdev.org/hacked-discord-bookmarklet-attacks/

πŸ₯ [ tweet ]
😈 [ 0gtweet, Grzegorz Tworek ]

Yet another built-in Windows downloader? πŸ€”
1. create LDIF file containing a http-based attrval-spec,
2. import it with ldifde.exe.
As an effect you can:
3. observe the request on the webserver,
4. find the file on your drive.
Enjoy 😈

πŸ₯ [ tweet ]
😈 [ podalirius_, Podalirius ]

Today with my friend @_Worty we're releasing a technique to coerce an NTLM authentication on #Windows #SQL #Server as the machine account (in most cases). πŸ₯³

A step by step demonstration is here: https://t.co/woCDA1M0Zr

πŸ”— https://github.com/p0dalirius/MSSQL-Analysis-Coerce

πŸ₯ [ tweet ]