Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ NUL0x4C, NULL ]

its been a long time since I last uploaded something, but earlier this day I had some time to drop this:
https://t.co/InVe1Nrr8F

πŸ”— https://github.com/NUL0x4C/APCLdr

πŸ₯ [ tweet ]
😈 [ theart42, Advanced Persistent Dread ]

As a project to learn some C# coding on Windows I ported the awesome netcat for Windows from C, so you can now load it reflectively. You can find the github repo here: https://t.co/WN84PoKioN

πŸ”— https://github.com/theart42/Sharpcat

πŸ₯ [ tweet ]
😈 [ tijme, Tijme Gommers ]

Cobalt Strike BOF that utilises AMD's Ryzen Master kernel driver to read and write physical memory. It currently escalates privileges from administrator to SYSTEM. Future goal is to add features such as disabling EDR, disabling ETW TI or dumping LSASS.

https://t.co/vErevstmwd

πŸ”— https://github.com/tijme/amd-ryzen-master-driver-v17-exploit

πŸ₯ [ tweet ]
😈 [ nikhil_mitt, Nikhil Mittal ]

TIL that it is possible to exclude Account Operators, Server Operators, Print Operators and Backup Operators from SDProp/AdminSDHolder! #ActiveDirectory #RedTeam
https://t.co/kzatGP3RfD

πŸ”— https://petri.com/active-directory-security-understanding-adminsdholder-object/

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

Silhouette. POC that mitigates the use of physical memory to dump credentials from LSASS, by @GabrielLandau
https://t.co/0z7P3olqyf

πŸ”— https://github.com/elastic/Silhouette

πŸ₯ [ tweet ]
😈 [ NUL0x4C, NULL ]

since "bringing your own version of ntdll" is a thing now, try downloading it from https://t.co/rGLjvyccIl instead of manually setting up a server to host ntdll's versions

πŸ”— https://winbindex.m417z.com/?file=ntdll.dll

πŸ₯ [ tweet ]
😈 [ Octoberfest73, Octoberfest7 ]

I’m pleased to release Inline-Execute-PE, a CobaltStrike toolkit enabling users to load and repeatedly run unmanaged Windows exe’s in Beacon memory without dropping to disk or creating a new process each time. https://t.co/1byTo7uCV1
#redteam #cybersecurity #malware

πŸ”— https://github.com/Octoberfest7/Inline-Execute-PE

πŸ₯ [ tweet ]
😈 [ BoreanJordan, Jordan Borean ]

Fresh new PowerShell module called ctypes https://t.co/Mtgfey0kLX. This makes it easier to prototype PInvoke calls in PowerShell. As an example, to call GetCurrentProcess(), it's simply:

$k32 = New-CtypesLib Kernel32.dll
$k32.GetCurrentProcess[IntPtr]()


πŸ”— https://www.powershellgallery.com/packages/Ctypes/0.1.0

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ 424f424f, rvrsh3ll ]

Guess I'm a miscreant. Check out my tool to create "HotKey" .lnk files. https://t.co/iWqIf3FjNJ

πŸ”— https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/master/Create-HotKeyLNK.ps1

πŸ₯ [ tweet ][ quote ]
😈 [ TrustedSec, TrustedSec ]

In this guide from @GuhnooPlusLinux, you'll learn how the new #BOFLoader extension allows BOFs to be used from a #Meterpreter session. Discover new attacks made possible in Meterpreter and avoid common errors. https://t.co/THThviAluo

πŸ”— https://hubs.la/Q01z2t0t0

πŸ₯ [ tweet ]
😈 [ c2_matrix, C2 Matrix | #C2Matrix ]

Excellent post on understanding how Sliver C2 works from both attack and defense perspective. Dare we say... #purpleteam #C2Matrix #redteam #blueteam

https://t.co/HfAgxwrv6C

πŸ”— https://www.cybereason.com/blog/sliver-c2-leveraged-by-many-threat-actors

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯14
😈 [ AnubisOnSec, anubis ]

The very first Red Team based article officially published by @nvidia is out now!

Honored to have my write up be the first one, but there will be many more coming out from my team this year.

https://t.co/y62teiMpi5

πŸ”— https://developer.nvidia.com/blog/exploiting-and-securing-jenkins-instances-at-scale-with-groovywaiter/

πŸ₯ [ tweet ]
😈 [ elad_shamir, Elad Shamir ]

Have you ever wondered how RODCs work and whether compromising one would necessarily allow for privilege escalation?

The answers are in my new post:
At the Edge of Tier Zero: The Curious Case of the RODC

https://t.co/GeNn1cxxhX

πŸ”— https://posts.specterops.io/at-the-edge-of-tier-zero-the-curious-case-of-the-rodc-ef5f1799ca06

πŸ₯ [ tweet ]
😈 [ bohops, bohops ]

PyBOF: In-memory loading and execution of Beacon Object Files (BOFs) through Python

https://t.co/Qu499zWNAn

cc: @kakt1s2015

πŸ”— https://github.com/rkbennett/pybof

πŸ₯ [ tweet ]
😈 [ eversinc33, eversinc33 ]

I am probably just tripping, but I didnt find any C# implementation of the StartWebclient BOF from @OutflankNL on github (?) so I did a quick copy paste port to C# to make that windows privesc even more straightforward https://t.co/LJgDB8Bd7E

πŸ”— https://github.com/eversinc33/SharpStartWebclient

πŸ₯ [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg β€œShutdown” ]

Big up to @Fransosiche and @Wlayzz for the new "HTTP Request Smuggling" page on The Hacker Recipes πŸ§‘β€πŸ³

https://t.co/9k8aKrAIjz

πŸ”— https://www.thehacker.recipes/web/config/http-request-smuggling

πŸ₯ [ tweet ]
😈 [ NinjaParanoid, Chetan Nayak (Brute Ratel C4 Author) ]

Here it goes. A detailed blog on proxying your DLL loads and hiding the original callstack from userland hooks/ETW with a new set of undocumented API and some hacky tricks. Code is on my Github repository. This one was a brain buster πŸ”₯

https://t.co/AKFW8hthXZ

πŸ”— https://0xdarkvortex.dev/proxying-dll-loads-for-hiding-etwti-stack-tracing/

πŸ₯ [ tweet ]
😈 [ _dirkjan, Dirk-jan ]

TIL about git add -p which allows you to choose which lines from a file to include in a commit 🀯. Super useful to pick smaller fixes and leave out large new things that are still a work in progress.

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

Keep in mind when scraping usernames from a #Cisco #CUCM server with @n00py1’s cucme[.]sh or @TrustedSec’s SeeYouCM-Thief: the names can be not only within the <userName> tag but also within the <firstName> and <lastName> tags. Worth checking!

https://t.co/GGX5OeKQ3Q

πŸ”— https://ppn.snovvcrash.rocks/pentest/infrastructure/networks/sip-voip#cisco-ip-phones

πŸ₯ [ tweet ]