๐ [ HackerRalf @hacker_ralf ]
Everyone takes a lot from the community... it's time to give something back yourself.
Kerbeus - BOF implementation of Rubeus (not all).
๐ https://github.com/RalfHacker/Kerbeus-BOF
P. S. PM me about all bugs
#redteam #kerberos #havoc #cobaltstrike #bof
๐ฅ [ tweet ]
Everyone takes a lot from the community... it's time to give something back yourself.
Kerbeus - BOF implementation of Rubeus (not all).
๐ https://github.com/RalfHacker/Kerbeus-BOF
P. S. PM me about all bugs
#redteam #kerberos #havoc #cobaltstrike #bof
๐ฅ [ tweet ]
๐10
๐ [ hermit @ackmage ]
hi, check out this tool for easy Linux kernel building and debugging - easylkb
worked on it together with @netspooky! ๐
writeup:
๐ http://tmpout.sh/3/20.html
repo:
๐ http://github.com/deepseagirl/easylkb
๐ฅ [ tweet ]
hi, check out this tool for easy Linux kernel building and debugging - easylkb
worked on it together with @netspooky! ๐
writeup:
๐ http://tmpout.sh/3/20.html
repo:
๐ http://github.com/deepseagirl/easylkb
๐ฅ [ tweet ]
๐4
๐ [ Synacktiv @Synacktiv ]
Unlock the Global Admin access ๐ on Azure with this pentesting mindmap made by @alexisdanizan!
๐ https://github.com/synacktiv/Mindmaps
๐ฅ [ tweet ]
Unlock the Global Admin access ๐ on Azure with this pentesting mindmap made by @alexisdanizan!
๐ https://github.com/synacktiv/Mindmaps
๐ฅ [ tweet ]
๐ฅ1
๐ [ OtterHacker @OtterHacker ]
Finally ๐คฉ I got a PIC code for my #beacon! It was a really nice journey and a lot of things have been learnt on the way. If you want to try it too, I found this blog by @winternl_t really interesting:
๐ https://winternl.com/shellcodestdio/
And as usual, the @C5pider #Havoc โค๏ธ
๐ฅ [ tweet ]
Finally ๐คฉ I got a PIC code for my #beacon! It was a really nice journey and a lot of things have been learnt on the way. If you want to try it too, I found this blog by @winternl_t really interesting:
๐ https://winternl.com/shellcodestdio/
And as usual, the @C5pider #Havoc โค๏ธ
๐ฅ [ tweet ]
๐ฅ2
๐ [ soka @pentest_soka ]
I just released a blogpost where I describe how two open source tools can be easily converted to Reflective DLL to be loaded in memory with Cobalt Strike.
This post comes along with which exists thanks to @Prepouce_ work
๐ https://sokarepo.github.io/redteam/2023/10/11/create-reflective-dll-for-cobaltstrike.html
๐ https://github.com/sokaRepo/CoercedPotatoRDLL
๐ฅ [ tweet ]
I just released a blogpost where I describe how two open source tools can be easily converted to Reflective DLL to be loaded in memory with Cobalt Strike.
This post comes along with which exists thanks to @Prepouce_ work
๐ https://sokarepo.github.io/redteam/2023/10/11/create-reflective-dll-for-cobaltstrike.html
๐ https://github.com/sokaRepo/CoercedPotatoRDLL
๐ฅ [ tweet ]
๐ฅ3
๐ [ ๐ ๐ ๐ ๐ ๐ ๐ @felixm_pw ]
Indisputable C2 tier list
๐ฅ [ tweet ]
Indisputable C2 tier list
๐ฅ [ tweet ]
ะบัะธะฝะถ ะธะปะธ ัะพัะป?๐15
๐ [ SAINTCON @SAINTCON ]
Lee Christensen, Will Schroeder, and Maxwell Harley - Fighting Data With Data
Detailing the various red team challenges regarding data, leading into how this influenced Nemesisโ architectural decisions and design.
๐ https://youtu.be/0q9u2hDcpIo
๐ฅ [ tweet ]
Lee Christensen, Will Schroeder, and Maxwell Harley - Fighting Data With Data
Detailing the various red team challenges regarding data, leading into how this influenced Nemesisโ architectural decisions and design.
๐ https://youtu.be/0q9u2hDcpIo
๐ฅ [ tweet ]
๐ฅ1
Offensive Xwitter
๐ [ Antonio Cocomazzi @splinter_code ] Do you want to start the RemoteRegistry service without Admin privileges? Just write into the "winreg" named pipe ๐ ๐ฅ [ tweet ]
๐ [ an0n @an0n_r0 ]
just found that SharpHound used this RemoteRegistry trigger already earlier for session enumeration, like nmap smb-enum-sessions script and Sysinternals PsLoggedOn also. here is a nice summary about it from Sven Defatsch (@compasssecurity) in 2022:
๐ https://blog.compass-security.com/2022/05/bloodhound-inner-workings-part-3/
๐ฅ [ tweet ][ quote ]
just found that SharpHound used this RemoteRegistry trigger already earlier for session enumeration, like nmap smb-enum-sessions script and Sysinternals PsLoggedOn also. here is a nice summary about it from Sven Defatsch (@compasssecurity) in 2022:
๐ https://blog.compass-security.com/2022/05/bloodhound-inner-workings-part-3/
๐ฅ [ tweet ][ quote ]
๐1๐ฅ1
Forwarded from vx-underground
Media is too big
VIEW IN TELEGRAM
Some nerd on Twitter named Bjorn Staal is programming out of his mind.
11/10. Solid programming skills (designed to demonstrate quantum entanglement)
11/10. Solid programming skills (designed to demonstrate quantum entanglement)
๐คฏ9๐1๐ฅ1
vx-underground
Some nerd on Twitter named Bjorn Staal is programming out of his mind. 11/10. Solid programming skills (designed to demonstrate quantum entanglement)
๐ [ ๐ญ๐รธ๐๐ ๐พ๐๐๐๐ @_nonfigurativ_ ]
Ok, so a lot of people have been asking me for code/writeup of this so I made a stripped down example (works with an infinite amount of windows) so that you can look at to get the basic gist of it (that's all I have time for now, sorry!).
๐ https://bgstaal.github.io/multipleWindow3dScene/
๐ https://github.com/bgstaal/multipleWindow3dScene
๐ฅ [ tweet ][ quote ]
Ok, so a lot of people have been asking me for code/writeup of this so I made a stripped down example (works with an infinite amount of windows) so that you can look at to get the basic gist of it (that's all I have time for now, sorry!).
๐ https://bgstaal.github.io/multipleWindow3dScene/
๐ https://github.com/bgstaal/multipleWindow3dScene
๐ฅ [ tweet ][ quote ]
๐5
๐ [ Ido Veltzman @Idov31 ]
Weekly Nidhogg update
Driver hiding feature is also finished and live in the dev branch: :)
On the photos you can see the before and after in DriverView (From Nirsoft's tools)
๐ https://github.com/Idov31/Nidhogg/tree/dev
#infosec #CyberSecurity
๐ฅ [ tweet ]
Weekly Nidhogg update
Driver hiding feature is also finished and live in the dev branch: :)
On the photos you can see the before and after in DriverView (From Nirsoft's tools)
๐ https://github.com/Idov31/Nidhogg/tree/dev
#infosec #CyberSecurity
๐ฅ [ tweet ]
๐4
๐ [ WHOAMI @wh0amitz ]
To audit the security of read-only domain controllers, I created the SharpRODC project, a simple .NET tool for RODC-related misconfigurations.
๐ https://github.com/wh0amitz/SharpRODC
#infosec #redteam #cybersecurity #pentesting
๐ฅ [ tweet ]
To audit the security of read-only domain controllers, I created the SharpRODC project, a simple .NET tool for RODC-related misconfigurations.
๐ https://github.com/wh0amitz/SharpRODC
#infosec #redteam #cybersecurity #pentesting
๐ฅ [ tweet ]
๐ฅ3
๐ [ OtterHacker @OtterHacker ]
Majority of custom #GetProcAddress I found didn't handle well forwarded export, here is a snippet for #GetProcAddress and #GetModuleHandle that handle this edge case !
Feel free to use it !
๐ https://gist.github.com/OtterHacker/8abaf54694ef27b9e3d38dfe57f13bd3
๐ฅ [ tweet ]
Majority of custom #GetProcAddress I found didn't handle well forwarded export, here is a snippet for #GetProcAddress and #GetModuleHandle that handle this edge case !
Feel free to use it !
๐ https://gist.github.com/OtterHacker/8abaf54694ef27b9e3d38dfe57f13bd3
๐ฅ [ tweet ]
๐ฅฑ1
ะ ะฐะทะฒะตัะฝััั ะฟัะธะฒะฐัะฝัะน Gitea ะฝะฐ VPS-ะบะต ะทะฐ 5 ะผะธะฝัั? ะะทะธ ๐๐ป
ะััะธัั ะธ ะฟัะปะปะธัั ัะตะฟะตัั ะผะพะถะฝะพ ะฟะพ ัะฐะบะพะผั ัะตะผะพััั ๐๐ป
ะะฐะบ ะถะต ะฟะพั ะพัะพัะตะป ะดะตะฒะพะฟั ะฟัะธ ะบะพะฝัะตะนะฝะตัะธะทะฐัะธะธ...
#devops #git #gitea
$ docker run -d --name mysql-gitea -e MYSQL_ROOT_PASSWORD='my_mysql_root_pass' -v /opt/volume/mysql-gitea:/var/lib/mysql mysql:latest
$ docker container exec -it mysql-gitea bash
# mysql -u root -p'my_mysql_root_pass'
mysql> CREATE USER 'gitea-user'@'%' IDENTIFIED BY 'my_gitea_db_password';
mysql> CREATE DATABASE giteadb;
mysql> GRANT ALL PRIVILEGES ON giteadb.* TO 'gitea-user'@'%';
mysql> FLUSH PRIVILEGES;
mysql> ^DBye
# exit
$ docker run -d --name gitea -v /opt/volume/gitea:/data -p 127.0.0.1:3000:3000 -p 127.0.0.1:2222:22 -e VIRTUAL_HOST=mygitea.local -e VIRTUAL_PORT=3000 -e USER_UID=1001 -e USER_GID=1001 -e DB_TYPE=mysql -e DB_HOST=172.17.0.2:3306 -e DB_NAME=giteadb -e DB_USER=gitea-user -e DB_PASSWD='my_gitea_db_password' gitea/gitea:latest
$ socat TCP4-LISTEN:31337,bind=0.0.0.0,fork TCP4:127.0.0.1:2222
ะััะธัั ะธ ะฟัะปะปะธัั ัะตะฟะตัั ะผะพะถะฝะพ ะฟะพ ัะฐะบะพะผั ัะตะผะพััั ๐๐ป
$ git remote set-url origin '[git@mygitea.local:31337]:snovvcrash/HackThePlanet.git'
ะะฐะบ ะถะต ะฟะพั ะพัะพัะตะป ะดะตะฒะพะฟั ะฟัะธ ะบะพะฝัะตะนะฝะตัะธะทะฐัะธะธ...
#devops #git #gitea
๐7๐ฅ2
๐ [ XMander @checkymander ]
Setting up Nemesis can be daunting, I wrote a blog post detailing the exact steps you need to to go from a fresh Ubuntu 22.04 image to a running Nemesis setup.
Future posts, I'd like to go into operational usage of it with Mythic and other tools
๐ https://blog.checkymander.com/red%20team/tools/operations/Nemesis-Zero-To-Hero/
๐ฅ [ tweet ]
Setting up Nemesis can be daunting, I wrote a blog post detailing the exact steps you need to to go from a fresh Ubuntu 22.04 image to a running Nemesis setup.
Future posts, I'd like to go into operational usage of it with Mythic and other tools
๐ https://blog.checkymander.com/red%20team/tools/operations/Nemesis-Zero-To-Hero/
๐ฅ [ tweet ]
Forwarded from Zer0Day Lab
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Zer0Day Lab
Please open Telegram to view this post
VIEW IN TELEGRAM