Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ _RastaMouse, Rasta Mouse ]

[BLOG]
Short post showing how C# Source Generators could be used to build customisable implants.

πŸ”— https://rastamouse.me/csharp-source-generators/

πŸ₯ [ tweet ]
πŸ‘1
😈 [ D1rkMtr, D1rkMtr ]

A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe)

πŸ”— https://github.com/TheD1rkMtr/TakeMyRDP

πŸ₯ [ tweet ]
πŸ‘4
😈 [ HackAndDo, Pixis ]

Here we go, new articles are ready on a brand new and exciting topic, smart contracts security! ⛓️

⏩To get things off to a good start, here's the first article, Blockchain 101.
Happy reading!

πŸ”— https://en.hackndo.com/blockchain/

πŸ₯ [ tweet ]

Π½Π΅ сильно ΡƒΠ²Π»Π΅ΠΊΠ°ΡŽΡΡŒ Π±Π»ΠΎΠΊΡ‡Π΅ΠΉΠ½Π°ΠΌΠΈ, Π½ΠΎ ΠΏΠΎΡ‡ΠΈΡ‚Π°Ρ‚ΡŒ ΠΌΠΎΠΆΠ½ΠΎ Ρ€Π°Π· ΠΎΡ‚ ΡƒΠ²ΠžΠΆΠ°Π΅ΠΌΠΎΠ³ΠΎ Π°Π²Ρ‚ΠΎΡ€Π°
πŸ”₯4πŸ‘2
😈 [ sensepost, Orange Cyberdefense's SensePost Team ]

Read how you can JOIN @steampipeio on @pdiscoveryio to get structured output in your reconnaissance / footprinting / bugbounty data in this experimental steampipe plugin by @leonjza!

Code here:

πŸ”— https://sensepost.com/blog/2023/select-from-projectdiscovery-join-steampipe/
πŸ”— https://github.com/sensepost/steampipe-plugin-projectdiscovery

πŸ₯ [ tweet ]
πŸ”₯2πŸ‘1
😈 [ Octoberfest73, Octoberfest7 ]

Happy early 4th- TeamsPhisher is out now! Send messages + attachments to external Teams users for the purpose of phishing for access.

This short project was a fun departure from all of the BOF and Post-ex stuff I typically focus on.

#redteam #Malware

πŸ”— https://github.com/Octoberfest7/TeamsPhisher

πŸ₯ [ tweet ]
πŸ”₯3😁1
😈 [ SEKTOR7net, SEKTOR7 Institute ]

A guide to building your engagement infrastructure, by AndrΓ© Tschapeller (@hipstertrojan)

#redteam

πŸ”— https://www.securesystems.de/blog/building-a-red-team-infrastructure-in-2023/

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ rayanlecat, Rayan Bouyaiche ]

Hello everyone ! This weekend I participated to @_leHACK_ where i could do the CrackMapExec workshop of @mpgn_x64 . I did a little writeup if you're interested

πŸ”— https://rayanlecat.ghost.io/write-up-workshop-cme-lehack-2023/

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ eversinc33, eversinc33 ]

I was tired of manually creating wordlists or having to rely on python for pre2k sprays, so did some small adjustments to @dafthack's DomainPasswordSpray to run pre2k password spraying on all computer objects of a domain.

πŸ”— https://github.com/eversinc33/Invoke-Pre2kSpray

πŸ₯ [ tweet ]
πŸ‘3
😈 [ EricaZelic, typedef struct _MALCOM { ]

Finally has some time to put the LDAP queries tweet in a blog post. Added some brief descriptions, how to enumerate nested group membership and members of Protected Users group.

πŸ”— https://www.politoinc.com/post/ldap-queries-for-offensive-and-defensive-operations

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ cnotin, Clément Notin ]

πŸ“„ "How to read Windows serialized certificates"

Sharing a code sample to read binary files in "%APPDATA%\Microsoft\SystemCertificates\My\Certificates", which are serialized certificates, using CryptQueryObject() (and more!)

πŸ”— https://medium.com/tenable-techblog/code-for-reading-windows-serialized-certificates-8634d3487ec7

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ 0x6d69636b, Michael Schneider ]

My colleague @m8r1us has written an article about hardware keyloggers:

πŸ”— https://www.scip.ch/en/?labs.20230706

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ vxunderground, vx-underground ]

The classic Russian "Hacker" magazine had some of the coolest artwork in the 90s

πŸ₯ [ tweet ]

true
πŸ”₯10πŸ‘1
😈 [ ShitSecure, S3cur3Th1sSh1t ]

After holding the talks at @x33fcon
and @WEareTROOPERS
done, I also finally managed to write down my latest research about userland hook evasion:

πŸ”— https://s3cur3th1ssh1t.github.io/Cat_Mouse_or_Chess/

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ Lares_, Lares ]

New blog post from Andy Gill of the @Lares_ Labs team: Introducing Slinky Cat - Living off the AD Land. Read it here #Lares #research #security

πŸ”— https://buff.ly/3puT3Nr

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ Gi7w0rm, Gi7w0rm ]

Just released a new #blogpost, where I analyze the initial stages of a #vbs / #powershell based #GuLoader / #CloudEye infection.
Shoutout to @malware_traffic for being the first to find this sample (which I noticed after analyzing it myself ^^).

1/2

πŸ”— https://gi7w0rm.medium.com/cloudeye-from-lnk-to-shellcode-4b5f1d6d877

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ washi_dev, Washi ]

I spent my Saturday on a dumb project answering the following question:

What is the smallest #dotnet Hello World binary?

Turns out, this rabbit hole is deeper than you may expect, so I wrote a blog post about it:
πŸ‘‰

#reversing #obfuscation #asmresolver

πŸ”— https://blog.washi.dev/posts/tinysharp/

πŸ₯ [ tweet ]
πŸ”₯5