Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ SEKTOR7net, SEKTOR7 Institute ]

Sliver comms from a threat hunter's perspective, by Kevin Breen of @immersivelabs

#redteam

https://t.co/apzLfFtYjX

πŸ”— https://www.immersivelabs.com/blog/detecting-and-decrypting-sliver-c2-a-threat-hunters-guide/

πŸ₯ [ tweet ]
😈 [ ZephrFish, Andy ]

Great post from @_RayRT on abusing different Active Directory object controls and how to detect them https://t.co/CFQvEuA0Rv #RedTeam #blueteam #purpleteam #cti

πŸ”— http://labs.lares.com/securing-active-directory-via-acls/

πŸ₯ [ tweet ]
πŸ‘6
😈 [ kleiton0x7e, Kleiton Kurti ]

Came up with an improved version of WMIExec. By leveraging the Win32_ScheduledJob class, we can remotely create scheduled jobs. This way it's not required anymore to rely on port 139 and 445.

Github:

#CyberSecurity #redteam #infosec #infosecurity

πŸ”— https://github.com/WKL-Sec/wmiexec/

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ Octoberfest73, Octoberfest7 ]

Happy early 4th- TeamsPhisher is out now! Send messages + attachments to external Teams users for the purpose of phishing for access.

This short project was a fun departure from all of the BOF and Post-ex stuff I typically focus on.

#redteam #Malware

πŸ”— https://github.com/Octoberfest7/TeamsPhisher

πŸ₯ [ tweet ]
πŸ”₯3😁1
😈 [ SEKTOR7net, SEKTOR7 Institute ]

A guide to building your engagement infrastructure, by AndrΓ© Tschapeller (@hipstertrojan)

#redteam

πŸ”— https://www.securesystems.de/blog/building-a-red-team-infrastructure-in-2023/

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ r1cksec, r1cksec ]

New cheatsheets pushed πŸ•΅οΈβ€β™‚οΈ

πŸ”— https://github.com/r1cksec/cheatsheets

Including:

A well written blog post on how to read and parse LSASS memory dumps with PowerShell πŸ”

#infosec #cybersecurity #pentesting #redteam #lsass #windows

πŸ”— https://powerseb.github.io/posts/LSASS-parsing-without-a-cat

πŸ₯ [ tweet ]
πŸ‘4
Media is too big
VIEW IN TELEGRAM
😈 [ fortunato lodari @flodari ]

Are you tired of failing to create DNS Entry for DavRelay?

LPE with:

ssh -R +
addcomputer.py +
Proxychains +
Proxylite +
PetitPotam +
rbcd_relay


no AV/EDR detection, only SIEM (if) checks on LDAP changes

#redteam #LPE #DAVRelay #FUD

πŸ₯ [ tweet ]

+ Π΄Π΅ΠΌΠΎ Π½Π° ΠΊΠΎΠ±Π΅:

πŸ”— https://threadreaderapp.com/thread/1697922181684936753.html
πŸ”₯10
😈 [ Louis Dion-Marcil @ldionmarcil ]

Outlook for Windows can be tricked into displaying a fake domain, but open another one. Add a <base> tag with a fake domain + left-to-right mark (U+200E)
Links in <a> tags will show the fake domain, but open the real domain.
No need to buy .zip! :) Convincing #phishing #redteam

πŸ₯ [ tweet ]
πŸ”₯5πŸ‘1πŸ₯±1
😈 [ HADESS @Hadess_security ]

The Art Of Hiding In Windows: techniques used by malicious actors to obscure their activities, making detection and analysis significantly more challenging for security professionals.

Article:
πŸ”— https://hadess.io/the-art-of-hiding-in-windows/

EBook:
πŸ”— https://hadess.io/the-art-of-hiding-in-windows-ebook/

#windows #redteam

πŸ₯ [ tweet ]

(pdf-ΠΊΠ° Π² ΠΊΠΎΠΌΠΌΠ΅Π½Ρ‚Π°Ρ…)
πŸ‘2πŸ”₯2