Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ serioton @seriotonctf ]

Just updated my NetExec cheatsheet. Added some new commands and tweaks. It includes the commands I use when working on HackTheBox and Vulnlab machines

πŸ”— https://github.com/seriotonctf/cme-nxc-cheat-sheet

πŸ₯ [ tweet ]
πŸ‘12πŸ₯±4
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ ProjectDiscovery @pdiscoveryio ]

Replace request headers from your terminal with Proxify by ProjectDiscovery!

⌨️
proxify -req-mrd "replace_regex(request, 'User-Agent: .*', 'User-Agent: <YOUR-PAYLOAD>')"


Check it out πŸ‘†

πŸ₯ [ tweet ]
πŸ₯±13πŸ‘10
😈 [ RedTeam Pentesting @RedTeamPT ]

The LLMNR response name spoofing pioneered by @tiraniddo and @Synacktiv does not seem to work with mDNS & NetBIOS 😒
But guess what! It works with DNS😯

πŸ₯³ Here's the new pretender release supporting Kerberos relaying via DHCPv6-DNS-Takeover: πŸŽ‰

πŸ”— https://github.com/RedTeamPentesting/pretender/releases/tag/v1.3.1

πŸ₯ [ tweet ]
πŸ”₯13πŸ‘6πŸ€”1
😈 [ MANSK1ES @mansk1es ]

Check out my new blog post, "Weaponizing Background Images for Information Disclosure and LPE" where I walk through the AnyDesk vuln I found a few months ago (CVE-2024-12754/ZDI-24-1711):

πŸ”— https://mansk1es.gitbook.io/AnyDesk_CVE-2024-12754

πŸ₯ [ tweet ]
πŸ”₯3
Forwarded from Ralf Hacker Channel (Ralf Hacker)
ΠŸΡ€ΠΎΡΡ‚Π°Ρ рСализация ts::multirdp

https://gist.github.com/S3cur3Th1sSh1t/8294ec59d1ef38cba661697edcfacb9b

#soft #ad #pentest #redteam #dev
πŸ‘6πŸ₯±2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Wietze @Wietze ]

πŸš€ Today I'm launching ArgFuscator: an open-source platform documenting command-line obfuscation tricks AND letting you generate your own

πŸ”₯ 68 executables supported out of the box - use right away, make tweaks, or create your own

πŸ‘‰ Now available at

πŸ”— http://argfuscator.net

πŸ₯ [ tweet ]
πŸ”₯10πŸ₯±4πŸ‘2πŸ€”2
😈 [ Daniel @0x64616e ]

My current understanding of Kerberos Relaying

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ Bobby Cooke @0xBoku ]

πŸ”ͺOpen-sourcing πŸ’€StringReaper BOF!
I've had great success in engagements carving credentials out of remote process memory with this BOF

πŸ”— https://github.com/boku7/StringReaper

πŸ₯ [ tweet ]
😈 [ eversinc33 🀍πŸ”ͺβ‹†ο½‘Λš ⋆ @eversinc33 ]

@0xBoku recent unhooking bof reminded of this fun trick on how to unhook any windows DLL without opening a handle to an on disk file - just download it from the MS symbol server and replace in memory :3

πŸ”— https://gist.github.com/eversinc33/86b4d1d71748a55efceb69a4f18f4d1d

πŸ₯ [ tweet ]
πŸ‘5
😈 [ Chetan Nayak (Brute Ratel C4 Author) @NinjaParanoid ]

BOF Development is in full flow at Dark Vortex. Multiple new standalone BOFs have been added and ported from various open source projects to BRC4-BOF-Artillery git-repo. New ones are mentioned in the commits. More crazy updates are on the way...

πŸ”— https://github.com/paranoidninja/BRC4-BOF-Artillery

πŸ₯ [ tweet ]
πŸ‘10πŸ”₯2
πŸ‘5πŸ”₯4
😈 [ vx-underground @vxunderground ]

Hi,

Just wrote a keylogger that uses ONLY the Windows COM (Component Object Model). The only WINAPI functions it has is GetModuleHandleW (could be replaced with a custom implemented to remove the function invocation), and GetConsoleWindow (forwards to actual SYSCALLs, can't strip it out).

Everything else is pure suffering. It is an abomination.

I'll be releasing it later once I clean up the code. It's a cool little proof-of-concept.

What should I name this thing?

-smelly smellington


πŸ”— https://vx-api.gitbook.io/vx-api/my-projects/jeff-com-only-keylogger

πŸ₯ [ tweet ]
πŸ‘2πŸ”₯2
😈 [ CodeX @codex_tf2 ]

Releasing WebcamBOFπŸ“Έ

Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options (as a file or screenshot). USB webcams supported (at least mine is)

Remind me never to use the MF API in BOFs again😭
(god i hate this codebase)

πŸ”— https://github.com/CodeXTF2/WebcamBOF

πŸ₯ [ tweet ]
πŸ‘4
Offensive Xwitter
😈 [ Daniel @0x64616e ] My current understanding of Kerberos Relaying πŸ₯ [ tweet ]
😈 [ CICADA8Research @CICADA8Research ]

Hello friends! There is a lot of information about Kerberos Relay out and it is easy to get confused! That's why we have created a small MindMap to help you understand Kerberos Relay

U can find PDF/HTML/PNG version here:

πŸ”— https://github.com/CICADA8-Research/Penetration/tree/main/KrbRelay%20MindMap

πŸ₯ [ tweet ]
πŸ‘9πŸ”₯4πŸ€”1
😈 [ Ellis Springe @knavesec ]

Dropping a one-off script to pull arbitrary AD attributes from ADExplorer snapshots. @0xBoku and I used this on a recent op to pull custom attributes that listed Computer objects owned by specific users so we could correlate high-value targets to systems:

πŸ”— https://github.com/c3c/ADExplorerSnapshot.py/pull/66

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ RedTeam Pentesting @RedTeamPT ]

πŸŽ‰ We've just released πŸ” keycred πŸŽ‰

A cross-platform tool for handling Active Directory Shadow Credentials/msDS-KeyCredentialLink πŸ”‘.

It supports UnPAC-the-Hash/PKINIT, Pass-the-Cert, Channel Binding and more πŸ’ͺπŸš€

πŸ”₯ Get it while it's still hot! πŸ”₯

πŸ”— https://github.com/RedTeamPentesting/keycred

πŸ₯ [ tweet ]
πŸ‘8πŸ₯±6
😈 [ Synacktiv @Synacktiv ]

In our latest article, @l4x4 revisits the secretsdump implementation, offering an alternative avoiding reg save and eliminates writing files to disk, significantly reducing the likelihood of triggering security alerts. Read the details at .

πŸ”— https://www.synacktiv.com/publications/lsa-secrets-revisiting-secretsdump

πŸ₯ [ tweet ]
πŸ₯±4πŸ”₯3
😈 [ TrustedSec @TrustedSec ]

In our new #blog, Senior Research Analyst @codewhisperer84 unveils his new tool DIT Explorer which he created after researching NTDS.dit files on Active Directory. Read part one of this series now to find out what this tool can do!

πŸ”— https://trustedsec.com/blog/exploring-ntds-dit-part-1-cracking-the-surface-with-dit-explorer

πŸ₯ [ tweet ]
πŸ‘3πŸ₯±3
😈 [ Orange Cyberdefense Switzerland @orangecyberch ]

πŸ’»πŸ›‘οΈIn this blog post, ClΓ©ment Labro explains how he developed a tool that lets you run Powershell without the various system protections.

πŸ‘‰ Discover this article on our blog:

πŸ”— https://blog.scrt.ch/2025/02/18/reinventing-powershell-in-c-c

πŸ₯ [ tweet ]
πŸ‘5πŸ₯±3πŸ”₯2
DFS Targets & Links

Π§Ρ‚ΠΎΠ±Ρ‹ Π½Π΅ Π΄Π΅Π»Π°Ρ‚ΡŒ Ρ‚Π°ΠΊ:

πŸ”— https://ppn.snovvcra.sh/pentest/infrastructure/ad/post-exploitation#locate-dfs-targets

Π’Π΅ΠΏΠ΅Ρ€ΡŒ ΠΌΠΎΠΆΠ½ΠΎ Π΄Π΅Π»Π°Ρ‚ΡŒ Ρ‚Π°ΠΊ:

πŸ”— https://github.com/c3c/ADExplorerSnapshot.py/pull/67
πŸ”₯7