๐ [ hackinarticles, Hacking Articles ]
MITRE ATT&CK: Initial Access
Credit https://t.co/wtfCJx9CMi
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
๐ https://github.com/JPMinty/MindMaps/tree/master/MITRE%20ATT%26CK/PNG
๐ฅ [ tweet ]
MITRE ATT&CK: Initial Access
Credit https://t.co/wtfCJx9CMi
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
๐ https://github.com/JPMinty/MindMaps/tree/master/MITRE%20ATT%26CK/PNG
๐ฅ [ tweet ]
๐ [ hackinarticles, Hacking Articles ]
IPV4 vs IPV6
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
๐ฅ [ tweet ]
IPV4 vs IPV6
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
๐ฅ [ tweet ]
๐ [ fr0gger_, Thomas Roccia ๐ค ]
I published a blogpost that presents ten useful python libraries that I use for malware analysis and reversing (with code examples)!
Which one are you using the most? ๐
#python #malware #cybersecurity #infosec
https://t.co/4q7N0ydQJa
๐ https://blog.securitybreak.io/10-python-libraries-for-malware-analysis-and-reverse-engineering-622751e6ebd0
๐ฅ [ tweet ]
I published a blogpost that presents ten useful python libraries that I use for malware analysis and reversing (with code examples)!
Which one are you using the most? ๐
#python #malware #cybersecurity #infosec
https://t.co/4q7N0ydQJa
๐ https://blog.securitybreak.io/10-python-libraries-for-malware-analysis-and-reverse-engineering-622751e6ebd0
๐ฅ [ tweet ]
๐ [ NandanLohitaksh, Lohitaksh Nandan ]
Best ever Tools ๐ง for Bug Bounty Hunters...
โAmass
โSublister
โGauplus
โHTTPX
โGf tool
โKxss
โSqlmap
โCommix
โTplmap
โHYDRA
โJohn the ripper
โBurpsuite
โArjun
โParamspider
โNoSQLmap
โNMAP
โNikto
โFFUF
โ403-Bypass
โGobuster
#bugbounty #cybersecurity
๐ฅ [ tweet ]
Best ever Tools ๐ง for Bug Bounty Hunters...
โAmass
โSublister
โGauplus
โHTTPX
โGf tool
โKxss
โSqlmap
โCommix
โTplmap
โHYDRA
โJohn the ripper
โBurpsuite
โArjun
โParamspider
โNoSQLmap
โNMAP
โNikto
โFFUF
โ403-Bypass
โGobuster
#bugbounty #cybersecurity
๐ฅ [ tweet ]
๐2
๐ [ bmcder02, Blake ]
Recently I got asked to do an overview on ETW. I tried to cover everything useful for #DFIR, including multiple ways to capture ETW, useful providers and finding existing trace sessions.
#cybersecurity
https://t.co/3IWn9w6JuQ
๐ http://bmcder.com/blog/a-begginers-all-inclusive-guide-to-etw
๐ฅ [ tweet ]
Recently I got asked to do an overview on ETW. I tried to cover everything useful for #DFIR, including multiple ways to capture ETW, useful providers and finding existing trace sessions.
#cybersecurity
https://t.co/3IWn9w6JuQ
๐ http://bmcder.com/blog/a-begginers-all-inclusive-guide-to-etw
๐ฅ [ tweet ]
๐ [ Tarlogic, Tarlogic ]
#ZeroTrust is one of the trending concepts in the #cybersecurity world. But the hype around it is perhaps a bit excessive. In this article, we explain why... ๐
https://t.co/hUiMeq6bnR
๐ https://www.tarlogic.com/blog/demystifying-zero-trust/
๐ฅ [ tweet ]
#ZeroTrust is one of the trending concepts in the #cybersecurity world. But the hype around it is perhaps a bit excessive. In this article, we explain why... ๐
https://t.co/hUiMeq6bnR
๐ https://www.tarlogic.com/blog/demystifying-zero-trust/
๐ฅ [ tweet ]
๐ [ ReconOne_, ReconOne ]
Shodan Dork in Manual mode - Part 1
Now that you all have Shodan membership it's time to try Shodan Dorks ๐๐
Credits: @securitytrails
#recon #Shodan #attacksurface #bugbountytips #BugBounty #cybersecurity
๐ฅ [ tweet ]
Shodan Dork in Manual mode - Part 1
Now that you all have Shodan membership it's time to try Shodan Dorks ๐๐
Credits: @securitytrails
#recon #Shodan #attacksurface #bugbountytips #BugBounty #cybersecurity
๐ฅ [ tweet ]
๐ [ NationalCyberS1, National Cyber Security Services ]
LinWinPwn:- A bash script that automates a number of Active Directory Enumeration and Vulnerability checks.
Link:https://t.co/pR8suEn8PZ
#hacking #bugbountytips #informationsecurity #cybersecurity #infosec #cybersecuritytips #Ethicalhacking #Pentesting
https://t.co/uJj502OabP
๐ https://github.com/lefayjey/linWinPwn
๐ https://ncybersecurity.com
๐ฅ [ tweet ]
LinWinPwn:- A bash script that automates a number of Active Directory Enumeration and Vulnerability checks.
Link:https://t.co/pR8suEn8PZ
#hacking #bugbountytips #informationsecurity #cybersecurity #infosec #cybersecuritytips #Ethicalhacking #Pentesting
https://t.co/uJj502OabP
๐ https://github.com/lefayjey/linWinPwn
๐ https://ncybersecurity.com
๐ฅ [ tweet ]
๐ [ pdiscoveryio, ProjectDiscovery.io ]
The Ultimate Guide to Finding Bugs With Nuclei by @v3natoris
https://t.co/2GY3QZlTft
#hackwithautomation #cybersecurity #infosec #bugbounty
๐ https://blog.projectdiscovery.io/ultimate-nuclei-guide/
๐ฅ [ tweet ]
The Ultimate Guide to Finding Bugs With Nuclei by @v3natoris
https://t.co/2GY3QZlTft
#hackwithautomation #cybersecurity #infosec #bugbounty
๐ https://blog.projectdiscovery.io/ultimate-nuclei-guide/
๐ฅ [ tweet ]
๐ [ Idov31, Ido Veltzman ]
I'm happy to release Venom - A C++ single header file for evasive network communication which using a stolen browser's socket to perform all of its network activities and by that can make it hard to trace it back to the process.
https://t.co/AVxQbNru3Z
#infosec #CyberSecurity
๐ https://github.com/Idov31/Venom
๐ฅ [ tweet ]
I'm happy to release Venom - A C++ single header file for evasive network communication which using a stolen browser's socket to perform all of its network activities and by that can make it hard to trace it back to the process.
https://t.co/AVxQbNru3Z
#infosec #CyberSecurity
๐ https://github.com/Idov31/Venom
๐ฅ [ tweet ]
๐ [ Octoberfest73, Octoberfest7 ]
Iโm pleased to release Inline-Execute-PE, a CobaltStrike toolkit enabling users to load and repeatedly run unmanaged Windows exeโs in Beacon memory without dropping to disk or creating a new process each time. https://t.co/1byTo7uCV1
#redteam #cybersecurity #malware
๐ https://github.com/Octoberfest7/Inline-Execute-PE
๐ฅ [ tweet ]
Iโm pleased to release Inline-Execute-PE, a CobaltStrike toolkit enabling users to load and repeatedly run unmanaged Windows exeโs in Beacon memory without dropping to disk or creating a new process each time. https://t.co/1byTo7uCV1
#redteam #cybersecurity #malware
๐ https://github.com/Octoberfest7/Inline-Execute-PE
๐ฅ [ tweet ]
๐ [ ZeroMemoryEx, V2 ]
New AMSI lifetime bypass, it works by searching for the first byte of each instruction to prevent updates from affecting it, Check it out.
#amsi #redteam #cybersecurity
https://t.co/J6lBOXWFyx
๐ https://github.com/ZeroMemoryEx/Amsi-Killer
๐ฅ [ tweet ]
New AMSI lifetime bypass, it works by searching for the first byte of each instruction to prevent updates from affecting it, Check it out.
#amsi #redteam #cybersecurity
https://t.co/J6lBOXWFyx
๐ https://github.com/ZeroMemoryEx/Amsi-Killer
๐ฅ [ tweet ]
๐ [ kleiton0x7e, Kleiton Kurti ]
Created a blogpost & a PoC for a custom Sleep Mask Kit that obfuscates data within a beacon's stack, prior to custom sleeping, by leveraging CPU cycles.
A great approach against memory investigation.
๐๏ธBlog: https://t.co/sop7XnF5tc
#cybersecurity #redteam #infosec
๐ https://whiteknightlabs.com/2023/05/02/masking-the-implant-with-stack-encryption/
๐ฅ [ tweet ]
Created a blogpost & a PoC for a custom Sleep Mask Kit that obfuscates data within a beacon's stack, prior to custom sleeping, by leveraging CPU cycles.
A great approach against memory investigation.
๐๏ธBlog: https://t.co/sop7XnF5tc
#cybersecurity #redteam #infosec
๐ https://whiteknightlabs.com/2023/05/02/masking-the-implant-with-stack-encryption/
๐ฅ [ tweet ]
๐คฏ3
๐ [ kleiton0x7e, Kleiton Kurti ]
We took a Cobalt Strike profile, modified it, and bypassed Crowdstrike & Sophos without encrypting the shellcode. Also bypassed all published YARA rules, sleep detections, and string detections around a CS beacon.
Blog: https://t.co/m7FNOwV6Nx
#CyberSecurity #redteam #infosec
๐ https://whiteknightlabs.com/2023/05/23/unleashing-the-unseen-harnessing-the-power-of-cobalt-strike-profiles-for-edr-evasion/
๐ฅ [ tweet ]
We took a Cobalt Strike profile, modified it, and bypassed Crowdstrike & Sophos without encrypting the shellcode. Also bypassed all published YARA rules, sleep detections, and string detections around a CS beacon.
Blog: https://t.co/m7FNOwV6Nx
#CyberSecurity #redteam #infosec
๐ https://whiteknightlabs.com/2023/05/23/unleashing-the-unseen-harnessing-the-power-of-cobalt-strike-profiles-for-edr-evasion/
๐ฅ [ tweet ]
๐1