Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ fr0gger_, Thomas Roccia ๐Ÿค˜ ]

I published a blogpost that presents ten useful python libraries that I use for malware analysis and reversing (with code examples)!

Which one are you using the most? ๐Ÿ
#python #malware #cybersecurity #infosec

https://t.co/4q7N0ydQJa

๐Ÿ”— https://blog.securitybreak.io/10-python-libraries-for-malware-analysis-and-reverse-engineering-622751e6ebd0

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ NandanLohitaksh, Lohitaksh Nandan ]

Best ever Tools ๐Ÿ”ง for Bug Bounty Hunters...

โ†’Amass
โ†’Sublister
โ†’Gauplus
โ†’HTTPX
โ†’Gf tool
โ†’Kxss
โ†’Sqlmap
โ†’Commix
โ†’Tplmap
โ†’HYDRA
โ†’John the ripper
โ†’Burpsuite
โ†’Arjun
โ†’Paramspider
โ†’NoSQLmap
โ†’NMAP
โ†’Nikto
โ†’FFUF
โ†’403-Bypass
โ†’Gobuster

#bugbounty #cybersecurity

๐Ÿฅ [ tweet ]
๐Ÿ‘2
๐Ÿ˜ˆ [ bmcder02, Blake ]

Recently I got asked to do an overview on ETW. I tried to cover everything useful for #DFIR, including multiple ways to capture ETW, useful providers and finding existing trace sessions.
#cybersecurity
https://t.co/3IWn9w6JuQ

๐Ÿ”— http://bmcder.com/blog/a-begginers-all-inclusive-guide-to-etw

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ Tarlogic, Tarlogic ]

#ZeroTrust is one of the trending concepts in the #cybersecurity world. But the hype around it is perhaps a bit excessive. In this article, we explain why... ๐Ÿ‘‡

https://t.co/hUiMeq6bnR

๐Ÿ”— https://www.tarlogic.com/blog/demystifying-zero-trust/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ReconOne_, ReconOne ]

Shodan Dork in Manual mode - Part 1

Now that you all have Shodan membership it's time to try Shodan Dorks ๐Ÿ‘€๐Ÿ‘‡

Credits: @securitytrails

#recon #Shodan #attacksurface #bugbountytips #BugBounty #cybersecurity

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ NationalCyberS1, National Cyber Security Services ]

LinWinPwn:- A bash script that automates a number of Active Directory Enumeration and Vulnerability checks.

Link:https://t.co/pR8suEn8PZ

#hacking #bugbountytips #informationsecurity #cybersecurity #infosec #cybersecuritytips #Ethicalhacking #Pentesting

https://t.co/uJj502OabP

๐Ÿ”— https://github.com/lefayjey/linWinPwn
๐Ÿ”— https://ncybersecurity.com

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ Idov31, Ido Veltzman ]

I'm happy to release Venom - A C++ single header file for evasive network communication which using a stolen browser's socket to perform all of its network activities and by that can make it hard to trace it back to the process.

https://t.co/AVxQbNru3Z

#infosec #CyberSecurity

๐Ÿ”— https://github.com/Idov31/Venom

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ Octoberfest73, Octoberfest7 ]

Iโ€™m pleased to release Inline-Execute-PE, a CobaltStrike toolkit enabling users to load and repeatedly run unmanaged Windows exeโ€™s in Beacon memory without dropping to disk or creating a new process each time. https://t.co/1byTo7uCV1
#redteam #cybersecurity #malware

๐Ÿ”— https://github.com/Octoberfest7/Inline-Execute-PE

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ZeroMemoryEx, V2 ]

New AMSI lifetime bypass, it works by searching for the first byte of each instruction to prevent updates from affecting it, Check it out.
#amsi #redteam #cybersecurity
https://t.co/J6lBOXWFyx

๐Ÿ”— https://github.com/ZeroMemoryEx/Amsi-Killer

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ kleiton0x7e, Kleiton Kurti ]

Created a blogpost & a PoC for a custom Sleep Mask Kit that obfuscates data within a beacon's stack, prior to custom sleeping, by leveraging CPU cycles.
A great approach against memory investigation.

๐Ÿ—’๏ธBlog: https://t.co/sop7XnF5tc

#cybersecurity #redteam #infosec

๐Ÿ”— https://whiteknightlabs.com/2023/05/02/masking-the-implant-with-stack-encryption/

๐Ÿฅ [ tweet ]
๐Ÿคฏ3
๐Ÿ˜ˆ [ kleiton0x7e, Kleiton Kurti ]

We took a Cobalt Strike profile, modified it, and bypassed Crowdstrike & Sophos without encrypting the shellcode. Also bypassed all published YARA rules, sleep detections, and string detections around a CS beacon.

Blog: https://t.co/m7FNOwV6Nx

#CyberSecurity #redteam #infosec

๐Ÿ”— https://whiteknightlabs.com/2023/05/23/unleashing-the-unseen-harnessing-the-power-of-cobalt-strike-profiles-for-edr-evasion/

๐Ÿฅ [ tweet ]
๐Ÿ‘1