π [ a13xp0p0v, Alexander Popov ]
I summarized the experience with code collaboration platforms in a short article:
"Mirroring GitHub projects in 2023"
https://t.co/kit4Dlik7t
π https://a13xp0p0v.github.io/2023/01/29/mirroring-github-projects.html
π₯ [ tweet ]
I summarized the experience with code collaboration platforms in a short article:
"Mirroring GitHub projects in 2023"
https://t.co/kit4Dlik7t
π https://a13xp0p0v.github.io/2023/01/29/mirroring-github-projects.html
π₯ [ tweet ]
π [ NinjaParanoid, Chetan Nayak (Brute Ratel C4 Author) ]
Some EDRs catch indirect syscalls with callstack analysis. Here is a totally new technique which build a clean callstack originating from ntdll to avoid detections. No ROP required and tested and works against every EDR. Enjoy! π₯
https://t.co/sALgfx6WQ0
π https://0xdarkvortex.dev/hiding-in-plainsight/
π₯ [ tweet ]
Some EDRs catch indirect syscalls with callstack analysis. Here is a totally new technique which build a clean callstack originating from ntdll to avoid detections. No ROP required and tested and works against every EDR. Enjoy! π₯
https://t.co/sALgfx6WQ0
π https://0xdarkvortex.dev/hiding-in-plainsight/
π₯ [ tweet ]
π [ d3lb3_, Julien Bedel ]
(1/5) New kid in town π
Following last week sudden regain of interest in KeePass trigger system abuse, I decided to prepone the release of KeePwn: an Impacket-based script dedicated to KeePass discovery and secret extraction for red teamers!
https://t.co/SXsy3UFY3K
π https://github.com/Orange-Cyberdefense/KeePwn
π₯ [ tweet ]
(1/5) New kid in town π
Following last week sudden regain of interest in KeePass trigger system abuse, I decided to prepone the release of KeePwn: an Impacket-based script dedicated to KeePass discovery and secret extraction for red teamers!
https://t.co/SXsy3UFY3K
π https://github.com/Orange-Cyberdefense/KeePwn
π₯ [ tweet ]
π€―2
π [ _bin_Ash, Ash ]
Impacket's psexec drops a binary (RemCom) that is over 10 years old when creating the service it uses for command execution.
May we all aspire to write tooling that is still relevant 10 years later. RemCom = goated π
Ref: https://t.co/LTNRaflIKr
RemCom: https://t.co/YrKw1nBtAt
π https://github.com/fortra/impacket/blob/master/examples/psexec.py
π https://github.com/kavika13/RemCom
π₯ [ tweet ]
Impacket's psexec drops a binary (RemCom) that is over 10 years old when creating the service it uses for command execution.
May we all aspire to write tooling that is still relevant 10 years later. RemCom = goated π
Ref: https://t.co/LTNRaflIKr
RemCom: https://t.co/YrKw1nBtAt
π https://github.com/fortra/impacket/blob/master/examples/psexec.py
π https://github.com/kavika13/RemCom
π₯ [ tweet ]
π₯2π1
Offensive Xwitter
BloodHound Unleashed.pdf
π [ n00py1, n00py ]
Slide from the CactusCon talk on all the ways to get data populated into BloodHound. Any that I missed? Which is your favorite?
π₯ [ tweet ]
Slide from the CactusCon talk on all the ways to get data populated into BloodHound. Any that I missed? Which is your favorite?
π₯ [ tweet ]
π€2
π [ metasploit, Metasploit Project ]
Metasploit Framework 6.3 is out nowπ
New features include native Kerberos authentication support, streamlined Active Directory attack workflows (AD CS, AD DS), and new modules that request, forge, and convert tickets between formats. https://t.co/Ucwrtmzt9W
π https://www.rapid7.com/blog/post/2023/01/30/metasploit-framework-6-3-released/
π₯ [ tweet ]
Metasploit Framework 6.3 is out nowπ
New features include native Kerberos authentication support, streamlined Active Directory attack workflows (AD CS, AD DS), and new modules that request, forge, and convert tickets between formats. https://t.co/Ucwrtmzt9W
π https://www.rapid7.com/blog/post/2023/01/30/metasploit-framework-6-3-released/
π₯ [ tweet ]
π [ SkelSec, SkelSec ]
First version of pySnaffler is uploaded to @porchetta_ind git!
It is the python port of the well-known Snaffler tool from @mikeloss and @sh3r4_hax.
pySnaffler is compatible with the TOML classifiers of the original project. More info below
https://t.co/76Dfren3TC
π https://gitlab.porchetta.industries/Skelsec/pysnaffler
π₯ [ tweet ]
First version of pySnaffler is uploaded to @porchetta_ind git!
It is the python port of the well-known Snaffler tool from @mikeloss and @sh3r4_hax.
pySnaffler is compatible with the TOML classifiers of the original project. More info below
https://t.co/76Dfren3TC
π https://gitlab.porchetta.industries/Skelsec/pysnaffler
π₯ [ tweet ]
πΉ [ snovvcrash, snπ₯Άvvcrπ₯sh ]
I got curious about how easy it would be to bypass some of the static detections for the RemComSvc binary (which is over 10 years old) and yeahβ¦ Pretty easy π
https://t.co/U44Ik5RxFQ
#psexec #impacket #remcom
π https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb
π₯ [ tweet ][ quote ]
I got curious about how easy it would be to bypass some of the static detections for the RemComSvc binary (which is over 10 years old) and yeahβ¦ Pretty easy π
https://t.co/U44Ik5RxFQ
#psexec #impacket #remcom
π https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb
π₯ [ tweet ][ quote ]
π [ bohops, bohops ]
[DynamicDotNet Tooling] Added a POC "Dynamic Assembly Loader" to the repo that loads and executes an assembly using a dynamic method and emitted MSIL instructions (C#).
System.Reflection.Emit is quite powerful (maybe more to come in a future blog post)
https://t.co/i801jA3gGh
π https://github.com/bohops/DynamicDotNet/blob/main/assembly_loader/DynamicAssemblyLoader.cs
π₯ [ tweet ]
[DynamicDotNet Tooling] Added a POC "Dynamic Assembly Loader" to the repo that loads and executes an assembly using a dynamic method and emitted MSIL instructions (C#).
System.Reflection.Emit is quite powerful (maybe more to come in a future blog post)
https://t.co/i801jA3gGh
π https://github.com/bohops/DynamicDotNet/blob/main/assembly_loader/DynamicAssemblyLoader.cs
π₯ [ tweet ]
π [ zux0x3a, Lawrence εε«ζ― | ΩΩΨ±Ψ§ΩΨ³ ]
https://t.co/Oa8giJvjNq Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.
π https://github.com/OmriBaso/RToolZ
π₯ [ tweet ]
https://t.co/Oa8giJvjNq Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.
π https://github.com/OmriBaso/RToolZ
π₯ [ tweet ]
π [ n00py1, n00py ]
Exploiting Resource Based Constrained Delegation (RBCD) with Pure Metasploit
https://t.co/IWuIKiiMzF
π https://www.n00py.io/2023/01/exploiting-resource-based-constrained-delegation-rbcd-with-pure-metasploit/
π₯ [ tweet ]
Exploiting Resource Based Constrained Delegation (RBCD) with Pure Metasploit
https://t.co/IWuIKiiMzF
π https://www.n00py.io/2023/01/exploiting-resource-based-constrained-delegation-rbcd-with-pure-metasploit/
π₯ [ tweet ]
π [ 0x0SojalSec, Md Ismail Ε ojalξ¨ ]
The shortest payload for a tiny php reverse shell written in 19 bytes using only non-alphanumeric characters. Hex values inside βΆ indicate raw bytes.
This will help to bypass WAF and execute PHP reverse shell for RCE.
get more detail about thisπ
π https://gist.github.com/0xSojalSec/5bee09c7035985ddc13fddb16f191075
#bugbountyTips #bugbounty
π₯ [ tweet ]
The shortest payload for a tiny php reverse shell written in 19 bytes using only non-alphanumeric characters. Hex values inside βΆ indicate raw bytes.
This will help to bypass WAF and execute PHP reverse shell for RCE.
get more detail about thisπ
π https://gist.github.com/0xSojalSec/5bee09c7035985ddc13fddb16f191075
#bugbountyTips #bugbounty
π₯ [ tweet ]
Forwarded from APT
βοΈ Privileger
Privilger allows you to work with privileges in Windows as easily as possible. There are three modes:
β Add privileges to an account;
β Start a process by adding a specific privilege to its token;
β Remove privilege from the user.
Thanks to:
@Michaelzhm
https://github.com/MzHmO/Privileger
#ad #windows #privilege #lsa
Privilger allows you to work with privileges in Windows as easily as possible. There are three modes:
β Add privileges to an account;
β Start a process by adding a specific privilege to its token;
β Remove privilege from the user.
Thanks to:
@Michaelzhm
https://github.com/MzHmO/Privileger
#ad #windows #privilege #lsa
π₯2
π [ 0xdf_, 0xdf ]
There's a new(ish) technique for exploiting PHP LFI to get RCE without uploading a webshell. I showed it in Beyond Root on UpDown, but wanted to go into more detail. We'll look at LFI2RCE and how it uses PHP filters to generate executed PHP from nothing.
https://t.co/dp3YYcPxks
π https://www.youtube.com/watch?v=TnLELBtmZ24
π₯ [ tweet ]
There's a new(ish) technique for exploiting PHP LFI to get RCE without uploading a webshell. I showed it in Beyond Root on UpDown, but wanted to go into more detail. We'll look at LFI2RCE and how it uses PHP filters to generate executed PHP from nothing.
https://t.co/dp3YYcPxks
π https://www.youtube.com/watch?v=TnLELBtmZ24
π₯ [ tweet ]