Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ _wald0, Andy Robbins ]

Today is Friday, which means it's #BloodHoundBasics day.

BloodHound collects user logons in a somewhat non-intuitive way. In this video I try my best explain exactly how BloodHound's logon session collection works: https://t.co/4XQqJ0Zulq

πŸ”— https://www.youtube.com/watch?v=q86VgM2Tafc

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ exploitph, Charlie Clark ]

Been working on some new features for PowerView, it's still a work in progress but just pushed a few, cert auth for LDAPS and StartTLS for Get-DomainObject, Get-DomainUser, Get-DomainComputer and Set-DomainObject 1/2

https://t.co/H9rrPiTZeD

πŸ”— https://github.com/0xe7/PowerSploit/blob/master/Recon/PowerView.ps1

πŸ₯ [ tweet ]
😈 [ _RastaMouse, Rasta Mouse ]

[BLOG]
GPO WMI filters - how they can screw you over, and some ways to deal with them.

https://t.co/9kBZQlYw7D

πŸ”— https://rastamouse.me/ous-and-gpos-and-wmi-filters-oh-my/

πŸ₯ [ tweet ]
😈 [ OscarAkaElvis, Γ“scar Alfonso DΓ­az ]

New Evil-WinRM release (v3.4). Released for the @uad360 cyber security event. C'mon @msftsecurity how about a new Defender signature? Let's dance 😁

https://t.co/PEwvSTxt8p

Thanks @CyberVaca_ @_Laox @arale61

#evilwinrm #winrm #hacking #pentesting

πŸ”— https://github.com/Hackplayers/evil-winrm

πŸ₯ [ tweet ]
πŸ‘2
😈 [ 0xdf_, 0xdf ]

Meta is a fun box from @hackthebox_eu centered around image processing. There's exiftool and ImageMagick exploits, and then abusing environment variables with sudo neofetch.

https://t.co/dnavhTIrwF

πŸ”— https://0xdf.gitlab.io/2022/06/11/htb-meta.html

πŸ₯ [ tweet ]
πŸ”₯2πŸ‘1
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Made a short Video regarding to usage && feature description for my Packer. Mostly for my Sponsors but maybe others will also find some interesting things in it as inspiration:
https://t.co/MsJ1sP0ZPt

πŸ”— https://www.youtube.com/watch?v=UHaIgdzqHDA

πŸ₯ [ tweet ]
πŸ‘1πŸ”₯1
😈 [ ReconOne_, ReconOne ]

Want to quickly find publicly exposed MySql backup files? Try this πŸ‘‡
Credits: @_bughunter

#recontips #AttackSurface #bugbountytips #mysql #reconone

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

[#Tooling βš”οΈ] 🧡 (1/6) A thread of integrating #shellcode #fluctuation technique into DInjector: https://t.co/4VLQkuXO4q

Main credits to @mariuszbit, @_RastaMouse and @ShitSecure for their great tools and blogs which I heavily relied on here.

#redteam #maldev

πŸ”— https://github.com/snovvcrash/DInjector/blob/0ed4182035f9dcd15cf987519e5f1320f669e962/DInjector/Modules/CurrentThread.cs#L233-L458

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ DirectoryRanger, DirectoryRanger ]

SharpWSUS. CSharp tool for lateral movement through WSUS
https://t.co/0hDHe6ePZs

πŸ”— https://github.com/nettitude/SharpWSUS

πŸ₯ [ tweet ]
πŸ‘1
😈 [ ORCA10K, ORCA ]

it's been a while since the last time I played with some c code, so I had to publish something:
https://t.co/LtYkuL2mtq

πŸ”— https://gitlab.com/ORCA666/kcthijacklib

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ 0gtweet, Grzegorz Tworek ]

The only difference between DnsGetCacheDataTable() and DnsGetCacheDataTableEx() is the first one returns only 15000 entries, while the second one allows you to raise such limit to MAXDWORD by specifying 1 as a parameter.
I need to disappoint you if you expect any documentation πŸ™„

πŸ₯ [ tweet ]
πŸ‘2
😈 [ DirectoryRanger, DirectoryRanger ]

From RPE to RCE - Workstation Takeover via RBCD and MR-RPC, by @gladiatx0r
https://t.co/k6JZznbLke

πŸ”— https://gist.github.com/gladiatx0r/1ffe59031d42c08603a3bde0ff678feb

πŸ₯ [ tweet ]
πŸ‘1
😈 [ last0x00, last ]

I wrote a non technical post on my blog regarding cybersecurity, nihilistic behavior, and how to stay positive. Sometimes we need a reminder that, after all, things are not that bad.
https://t.co/OGl17xTwco

πŸ”— https://blog.notso.pro/2022-06-12-avoiding-cyber-nihilism/

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ NandanLohitaksh, Lohitaksh Nandan ]

Best ever Tools πŸ”§ for Bug Bounty Hunters...

β†’Amass
β†’Sublister
β†’Gauplus
β†’HTTPX
β†’Gf tool
β†’Kxss
β†’Sqlmap
β†’Commix
β†’Tplmap
β†’HYDRA
β†’John the ripper
β†’Burpsuite
β†’Arjun
β†’Paramspider
β†’NoSQLmap
β†’NMAP
β†’Nikto
β†’FFUF
β†’403-Bypass
β†’Gobuster

#bugbounty #cybersecurity

πŸ₯ [ tweet ]
πŸ‘2
😈 [ nas_bench, Nasreddine Bencherchali ]

In addition to the documented "-e/--exec" flag in #lolbas about the "wsl.exe" binary (https://t.co/OrgJ7c7o9N). We can also use the "--system" flag to run Linux (as root) /Windows commands.

wsl --system [Command]

πŸ”— https://lolbas-project.github.io/lolbas/OtherMSBinaries/Wsl/

πŸ₯ [ tweet ]
πŸ‘1
😈 [ reverseame, reverseame ]

The curious case of mavinject.exe https://t.co/UcUjZ2wsFR

πŸ”— https://fourcore.io/blogs/mavinject-curious-process-injection

πŸ₯ [ tweet ]
πŸ‘1
😈 [ elkement, elkement ]

One more post about Microsoft's recent security updates - re changes to Kerberos and the new certificate extension containing the requester's SID: https://t.co/TbACZaFARl

πŸ”— https://elkement.blog/2022/06/13/defused-that-san-flag/

πŸ₯ [ tweet ]
πŸ‘1
😈 [ 0gtweet, Grzegorz Tworek ]

Looks like the only purpose of the undocumented "/debug" parameter for qwinsta.exe is to mess with the output in a way making it useless for bad actors πŸ™ƒ

πŸ₯ [ tweet ]
😈 [ ORCA10K, ORCA ]

just published "RelocAlloc", a poc to allocate memory for your shellcode, using .reloc section(s), avoiding VirtualAlloc and others
https://t.co/9UNT0aDnJJ

πŸ”— https://gitlab.com/ORCA666/relocalloc

πŸ₯ [ tweet ]
πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ x86matthew, x86matthew ]

ProcEnvInjection - Remote code injection by abusing process environment strings in CreateProcess.

Another method of injecting code into a remote process without using WriteProcessMemory. πŸ™‚

https://t.co/PxaiiFVjV8

πŸ”— https://www.x86matthew.com/view_post?id=proc_env_injection

πŸ₯ [ tweet ]
πŸ‘2