Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ byt3bl33d3r, Marcello ]

This is neato
"Alpine, Ubuntu, Fedora, and Arch based containers containing full desktop environments in officially supported flavors accessible via any modern web browser."
https://t.co/VSTYMXDYma

πŸ”— https://docs.linuxserver.io/images/docker-webtop

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ Six2dez1, Six2dez ]

I can't say enough about how useful @TomNomNom's hacks repository is. Lately whenever I need something I go there to take a look because it almost always has the solution, so I can never improve my Golang skills!

Latest discovery https://t.co/0DYgf4qkko

long live open source❀️

πŸ”— https://github.com/tomnomnom/hacks/tree/master/inscope

πŸ₯ [ tweet ]
πŸ‘1
😈 [ mttaggart, Taggart ]

I'd just like to point out that a number of us have been providing free, high quality infosec content on Twitch for years without so much as a blurb in the Register.

@goproslowyo
@0xTib3rius
@Alh4zr3d
@xfootpics4salex
@ShawnLo

And many more at https://t.co/LnMWvE4jwN https://t.co/MB2rYdNPjC

πŸ”— https://infosecstreams.github.io/

πŸ₯ [ tweet ][ quote ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

Was trying to improve my #password #spraying approach in AD by previewing FGPPs and mapping them to the users they’re applied to, but it turns out you have to be an admin to do that πŸ˜’

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ CyberarkLabs, CyberArk Labs ]

Passwords and cookies are stored in Chrome’s memory in clear-text. Attackers can load into memory all the passwords that are stored in the password manager (β€œLogin Data” file).

https://t.co/L1JRO22ktu

πŸ”— http://spr.ly/6017zZ6Ft

πŸ₯ [ tweet ]
πŸ‘3
😈 [ 0xBoku, Bobby Cooke ]

BokuLoader now uses its best evasion features out of the box, +ASM Caesar cipher string obfuscation, +bug fixes, and +code enhancements. Dropped 32bit for now and all around slimmed down the code. Needed a clean base for coming feature updates ;)

https://t.co/At0dcvYZF0

πŸ”— https://github.com/boku7/BokuLoader

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ 0gtweet, Grzegorz Tworek ]

3 pieces of information:
1. The interesting one - if svchost.exe cannot find "Parameters" subkey, it tries to read ServiceDll entry from the parent (service) key!
2. The bad one - tools rarely check such DLLs.
3. The great one - my tool was just updated - https://t.co/ySr6QM0f3b

πŸ”— https://github.com/gtworek/PSBits/blob/master/Services/Get-ServiceDlls.ps1

πŸ₯ [ tweet ]
😈 [ _wald0, Andy Robbins ]

ICYMI: This week I published a 3-part blog series on managed identity attack paths in various #Azure services:

Part 1, Automation Accounts: https://t.co/gZ6QjGw6CE
Part 2, Logic Apps: https://t.co/3Jtw4rcHdm
Part 3, Function Apps: https://t.co/MJh46fqs2m

πŸ”— https://posts.specterops.io/82667d17187a
πŸ”— https://posts.specterops.io/52b29354fc54
πŸ”— https://posts.specterops.io/300065251cbe

πŸ₯ [ tweet ]
😈 [ Cneelis, Cn33liz ]

It's #BOFFriday so time for a new @OutflankNL C2-Tool-Collection update:
> Psx - Show detailed process information incl. OPSEC checks.
> Psc - Show detailed information from processes with established TCP and RDP connections.
https://t.co/Wq1obZDfRU

πŸ”— https://github.com/outflanknl/C2-Tool-Collection

πŸ₯ [ tweet ]
πŸ‘2
😈 [ Cx01N_, Cx01N ]

Here is the material from #defcon29 in case anyone missed last years.

https://t.co/4lk4Y6UWXe

πŸ”— https://github.com/BC-SECURITY/Beginners-Guide-to-Obfuscation

πŸ₯ [ tweet ][ quote ]
πŸ‘1
😈 [ _wald0, Andy Robbins ]

Today is Friday, which means it's #BloodHoundBasics day.

BloodHound collects user logons in a somewhat non-intuitive way. In this video I try my best explain exactly how BloodHound's logon session collection works: https://t.co/4XQqJ0Zulq

πŸ”— https://www.youtube.com/watch?v=q86VgM2Tafc

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ exploitph, Charlie Clark ]

Been working on some new features for PowerView, it's still a work in progress but just pushed a few, cert auth for LDAPS and StartTLS for Get-DomainObject, Get-DomainUser, Get-DomainComputer and Set-DomainObject 1/2

https://t.co/H9rrPiTZeD

πŸ”— https://github.com/0xe7/PowerSploit/blob/master/Recon/PowerView.ps1

πŸ₯ [ tweet ]
😈 [ _RastaMouse, Rasta Mouse ]

[BLOG]
GPO WMI filters - how they can screw you over, and some ways to deal with them.

https://t.co/9kBZQlYw7D

πŸ”— https://rastamouse.me/ous-and-gpos-and-wmi-filters-oh-my/

πŸ₯ [ tweet ]
😈 [ OscarAkaElvis, Γ“scar Alfonso DΓ­az ]

New Evil-WinRM release (v3.4). Released for the @uad360 cyber security event. C'mon @msftsecurity how about a new Defender signature? Let's dance 😁

https://t.co/PEwvSTxt8p

Thanks @CyberVaca_ @_Laox @arale61

#evilwinrm #winrm #hacking #pentesting

πŸ”— https://github.com/Hackplayers/evil-winrm

πŸ₯ [ tweet ]
πŸ‘2
😈 [ 0xdf_, 0xdf ]

Meta is a fun box from @hackthebox_eu centered around image processing. There's exiftool and ImageMagick exploits, and then abusing environment variables with sudo neofetch.

https://t.co/dnavhTIrwF

πŸ”— https://0xdf.gitlab.io/2022/06/11/htb-meta.html

πŸ₯ [ tweet ]
πŸ”₯2πŸ‘1
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Made a short Video regarding to usage && feature description for my Packer. Mostly for my Sponsors but maybe others will also find some interesting things in it as inspiration:
https://t.co/MsJ1sP0ZPt

πŸ”— https://www.youtube.com/watch?v=UHaIgdzqHDA

πŸ₯ [ tweet ]
πŸ‘1πŸ”₯1
😈 [ ReconOne_, ReconOne ]

Want to quickly find publicly exposed MySql backup files? Try this πŸ‘‡
Credits: @_bughunter

#recontips #AttackSurface #bugbountytips #mysql #reconone

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

[#Tooling βš”οΈ] 🧡 (1/6) A thread of integrating #shellcode #fluctuation technique into DInjector: https://t.co/4VLQkuXO4q

Main credits to @mariuszbit, @_RastaMouse and @ShitSecure for their great tools and blogs which I heavily relied on here.

#redteam #maldev

πŸ”— https://github.com/snovvcrash/DInjector/blob/0ed4182035f9dcd15cf987519e5f1320f669e962/DInjector/Modules/CurrentThread.cs#L233-L458

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ DirectoryRanger, DirectoryRanger ]

SharpWSUS. CSharp tool for lateral movement through WSUS
https://t.co/0hDHe6ePZs

πŸ”— https://github.com/nettitude/SharpWSUS

πŸ₯ [ tweet ]
πŸ‘1