Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ zimnyaatishina, zimnyaa ]

It's an okay language.
https://t.co/mr46UrK4CL

๐Ÿ”— https://tishina.in/execution/golang-winmaldev-basics

๐Ÿฅ [ tweet ]
Offensive Xwitter
๐Ÿ˜ˆ [ ZeroMemoryEx, V2 ] Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes https://t.co/UGt7cd1DYu ๐Ÿ”— https://github.com/ZeroMemoryEx/Terminator ๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ merterpreter, mert ]

SharpTerminatator is a C# port of ZeroMemoryEx's art piece called Terminator. It can be used with Cobalt Strike's execute-assembly or as a standalone executable.

All hail goes to him.

and ofcourse spyboy :)

https://t.co/m8KqH4kVAt

๐Ÿ”— https://github.com/mertdas/SharpTerminator

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ DarkCoderSc, Jean-Pierre LESUEUR ]

๐Ÿ›ธ๐Ÿ‘ฝ Interested in C2 over FTP(S)? Explore my new project, SharpFtpC2, which enables execution of shell commands on remote systems via FTP(S). Currently in beta and lacking encryption, but it's on the way: https://t.co/9Dkf19MhJL

#InfoSec #Malware #Network #Evasion #FTP

๐Ÿ”— https://github.com/DarkCoderSc/SharpFtpC2

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ 0xdeaddood, leandro ]

๐Ÿ“Want to know more? Check out my new blogpost! Forging tickets in 2023 with Impacket ๐ŸŽŸ๏ธ.
https://t.co/TYEiUMVNEc

๐Ÿ”— https://0xdeaddood.rocks/2023/05/11/forging-tickets-in-2023/

๐Ÿฅ [ tweet ]
๐Ÿ‘2
๐Ÿ˜ˆ [ mariuszbit, mgeeky | Mariusz Banach ]

Game cheaters don't get along with Red Teamers very well ๐Ÿ˜ญ

https://t.co/J4cktI3qDg

๐Ÿ”— https://www.unknowncheats.me/forum/anti-cheat-bypass/587585-terminator.html

๐Ÿฅ [ tweet ]

ะท. ั‹. ะบะพะผะผะตะฝั‚ั‹ ะฒ ั‚ะฒะธั‚ั‚ะตั€ ั‚ั€ะตะดะต ะดะพัั‚ะฐะฒะปััŽั‚ ะฝะต ะผะตะฝัŒัˆะต ะบะพะผะผะตะฝั‚ะพะฒ ะฝะฐ unknowncheats
๐Ÿ˜4
๐Ÿ˜ˆ [ _RastaMouse, Rasta Mouse ]

Dang 600,000...

๐Ÿฅ [ tweet ]

ะผั‹ ั‚ัƒั‚ ั‚ะฐะบะธะต ัะตััƒั€ะฝั‹ะต, ัƒ ะฝะฐั pbkdf2 ะฒั‹ัั‚ะฐะฒะปะตะฝ ะฒ 600ะบ ะธั‚ะตั€ะฐั†ะธะนโ€ฆ ะฟั€ะฐะฒะดะฐ ะฝะฐั ะปะพะผะฐัŽั‚ ั‡ะตั€ะตะท ะดะตะฝัŒ, ะฝะพ ัั‚ะพ ะดั€ัƒะณะพะต, ั‚ะพ-ะพ-ะพั‡ะฝะพโ€ฆ ัƒะฑะตะณะฐะนั‚ะต ะพั‚ ัั‚ะธั… ะฝะตะฐะดะตะบะฒะฐั‚ะพะฒ ะฝะฐ ัะตะปั„-ั…ะพัั‚ะตะด ะฑะธั‚ะฒะฐั€ะดะตะฝ, ะบัั‚ะฐั‚ะธ
๐Ÿ‘2๐Ÿ˜2
๐Ÿ˜ˆ [ an0n_r0, an0n ]

poor man's browser pivot through chrome remote debugging.๐Ÿ”ฅ

no need to inject into iexplorer anymore.๐Ÿ’ช

just came across this awesome solution shared by @NotMedic long ago: https://t.co/oPU8cZnecv

and this is also working with msedge (it shares the same chromium engine)!๐ŸŽ‰

๐Ÿ”— https://gist.github.com/NotMedic/b1ab7809eea94cc05513905b26964663

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ghostlulz1337, ghostlulz ]

If you want to learn more about Internal Pentesting & Red Teaming these are some really good resources

๐Ÿ”— https://book.hacktricks.xyz/
๐Ÿ”— https://www.thehacker.recipes/
๐Ÿ”— https://ppn.snovvcrash.rocks/
๐Ÿ”— https://cheats.philkeeble.com/
๐Ÿ”— https://dmcxblue.gitbook.io/
๐Ÿ”— https://www.vincentyiu.com/
๐Ÿ”— https://www.ired.team/

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ9
๐Ÿ˜ˆ [ ippsec, ippsec ]

Third part in my Configuring Parrot via Ansible Series is now up. This one configures both Firefox and Burpsuite, and hopefully will serve as a good intro to Jinja2 Templating, which makes customizing scripts/files a breeze. Check out the video here:

Part 1
๐Ÿ”— https://youtu.be/2y68gluYTcc

Part 2
๐Ÿ”— https://youtu.be/VRz_vtPBZzA

Part 3
๐Ÿ”— https://youtu.be/XDJB0TVKtNk

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3๐Ÿ‘1
๐Ÿ˜ˆ [ ZephrFish, Andy ]

Great post from @_RayRT on abusing different Active Directory object controls and how to detect them https://t.co/CFQvEuA0Rv #RedTeam #blueteam #purpleteam #cti

๐Ÿ”— http://labs.lares.com/securing-active-directory-via-acls/

๐Ÿฅ [ tweet ]
๐Ÿ‘6
๐Ÿ˜ˆ [ an0n_r0, an0n ]

Mini-HOWTO about setting up Full Disk Encryption with unattended auto-unlock using TPM2 w/ Secure Boot on Kali.

Useful for rogue devices (auto-connecting to C2), headless pentest boxes, etc. storing confidential information but lacking physical security.

https://t.co/vOXnlpZcm6

๐Ÿ”— https://gist.github.com/tothi/c7fdaaca3d61b7e3298863ada358fc1e

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ2
๐Ÿ˜ˆ [ virustotal, VirusTotal ]

In late 2022 we started monitoring PyPI, the most important Python repository. In a few weeks, we found dozens of suspicious packages. Here is our deep dive into PyPI hosted malware, by
@alexey_firsh: https://t.co/EdGdlOFw9L

๐Ÿ”— https://blog.virustotal.com/2023/06/inside-of-wasps-nest-deep-dive-into.html

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
๐Ÿ˜ˆ [ d4rksystem, Kyle Cucci ]

Really nice analysis from @voidsec of the vulnerable driver used by Spybot's Terminator tool.

https://t.co/08M2Dr5AMF

๐Ÿ”— https://voidsec.com/reverse-engineering-terminator-aka-zemana-antimalware-antilogger-driver/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ HackingLZ, Justin Elze ]

CS COFFLoader is public now thanks @_snus https://t.co/NIaNFWR47z https://t.co/nFahK7ZZX2

๐Ÿ”— https://github.com/trustedsec/CS_COFFLoader/

๐Ÿฅ [ tweet ]
๐Ÿ‘2
๐Ÿ˜ˆ [ k_sec, Kurt Baumgartner ]

we go deeper yet into OpTriangulation...

๐Ÿ”— https://securelist.com/triangledb-triangulation-implant/110050/

funny thing, it reminds me of a simple string xor decoder that i wrote for purple lambert research a few years ago.
course, many malware families use the same obfuscation...

#include <stdio.h>
#include <string.h>

int main(int argc, const char* argv[]){
unsigned int i=0;
unsigned char c1, c2, x1;
const int s1[] = {0x76, 0x18, 0x6C, 0x08, 0x64, 0x08, 0x00}; //obfuscated string value here

const int *s2 = malloc(sizeof(s1));
memcpy(s2,s1,sizeof(s1));

// simple xor between current and next value
while (s2[i+1] != '\0') {
c1 = (unsigned char) s1[i];
c2 = (unsigned char) s2[i+1];
x1 = c1 ^ c2;
printf("%c", x1);
i++;
}
printf("\n");

return 0;
}

๐Ÿฅ [ tweet ]
๐Ÿ‘2๐Ÿ˜1
๐Ÿ˜ˆ [ pfiatde, pfiatde ]

Command detection in Powershell is not easy.
Some words about an obfuscated LSASS dumper command via comsvcs.
Plus some ways to circumvent deletion of the dump.

๐Ÿ”— https://badoption.eu/blog/2023/06/21/dumpit.html
๐Ÿ”— https://github.com/powerseb/PowerExtract

๐Ÿฅ [ tweet ]
๐Ÿ‘1
๐Ÿ˜ˆ [ pdnuclei, nuclei ]

If you're not writing custom Nuclei templates, you're missing out! ๐Ÿ˜ข

โš›๏ธ In this blog post, we explore the power of nuclei custom templates and how creating your own is beneficial for users!

Don't miss out, read this ๐Ÿ‘‡

๐Ÿ”— https://blog.projectdiscovery.io/if-youre-not-writing-custom-nuclei-templates-youre-missing-out/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ R0h1rr1m, Furkan Gรถksel ]

I developed a Fileless Lateral Movement tool called NimExec. It changes service configuration to execute the payload via manually crafted RPC packets. It's the improved version of @JulioUrena 's SharpNoPSExec with Pass the Hash support. Enjoy!

#infosec
https://t.co/G6xeyHVmnf

๐Ÿ”— https://github.com/frkngksl/NimExec

๐Ÿฅ [ tweet ]