Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ DirectoryRanger, DirectoryRanger ]

Total Registry. Replacement for the Windows built-in Regedit.exe tool with several improvements, by @zodiacon
https://t.co/bNB6aXdcV4

πŸ”— https://github.com/zodiacon/TotalRegistry

πŸ₯ [ tweet ]
πŸ‘1
😈 [ DirectoryRanger, DirectoryRanger ]

Marshmallows & Kerberoasting
https://t.co/7VB1upHLU5

πŸ”— https://redcanary.com/blog/marshmallows-and-kerberoasting/

πŸ₯ [ tweet ]
πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ mrd0x, mr.d0x ]

Demo:
Injecting a JS keylogger using WebView2 into login[.]microsoftonline[.]com.

Better quality: https://t.co/rfJmr48s6n
Blog post: https://t.co/61FwQibZol

πŸ”— https://imgur.com/a/Apl1DRl
πŸ”— https://mrd0x.com/attacking-with-webview2-applications/

πŸ₯ [ tweet ]
😈 [ c3rb3ru5d3d53c, ςΡяβΡяμs - мαℓωαяΡ яΡsΡαяςнΡя ]

Hey guys, my #malware #analysis for absolute beginners guide just dropped!

βœ… Completely Free
βœ… Mistakes to Avoid
βœ… Setting up your first VM
βœ… Purpose Driven
βœ… Where to get Malware Samples
βœ… Creating a Portfolio

Recording a video soon too! 😘

https://t.co/zL8Sr0IzHG https://t.co/IYJV7mEatt

πŸ”— https://c3rb3ru5d3d53c.github.io/docs/malware-analysis-beginner-guide/

πŸ₯ [ tweet ][ quote ]
😈 [ Six2dez1, Six2dez ]

git clone https://t.co/yI71DCtPUF
cd cve-2022-22980-exp
mvn install
docker run -d -p 27017:27017 --name example-mongo mongo:latest
java -jar target/mongo-example-0.0.1-SNAPSHOT.jar

πŸ”— https://github.com/jweny/cve-2022-22980-exp

πŸ₯ [ tweet ]
😈 [ clintgibler, Clint Gibler ]

πŸ—’οΈ Awesome RCE Techniques

A list of techniques to achieve Remote Code Execution on various apps

Including:

CMS - Joomla, Wordpress

LMS - Moodle

Frameworks - JBoss, Tomcat

Other - GiTea, Jenkins

By @podalirius_

#bugbounty #bugbountytips

https://t.co/9kOdw4ammT

πŸ”— https://github.com/p0dalirius/Awesome-RCE-techniques

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ Tyl0us, Matt Eidelberg ]

Mangle is a tool that manipulates aspects of compiled PEs to avoid detection from EDRs. It can strip out IoCs and inflate files to avoid detection and more. Check it out https://t.co/lpQCrDGnd1 #netsec #redteam #evasion

πŸ”— https://github.com/optiv/Mangle

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ merill, Merill Fernando β€’ πŸ‡¦πŸ‡Ί β€’ πŸ‡±πŸ‡° ]

Local Administrator Password Solution (LAPS) coming natively to a Windows device near you.

What about Azure AD Joined devices you ask? πŸ‘‡

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ am0nsec, Paul L. ]

Been trying to find a way to dynamically (introspection?) resolve symbols within the kernel in order to experiment with undocumented/non-exported symbols with the help of PDBs. Getting the inspiration from reversing WinDBG/kdexts and the way they evaluate expressions.

πŸ₯ [ tweet ]
😈 [ adamsvoboda, Adam Svoboda ]

Want to dump LSASS but dealing with MDE/ATP and ASR rules? Learn how to extract a list of whitelisted exclusion paths from Defender's signature update files in this blog post: https://t.co/08Uo0UpQcm

πŸ”— https://adamsvoboda.net/extracting-asr-rules/

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ NinjaParanoid, Paranoid Ninja (Brute Ratel C4) ]

Going forward Brute Ratel will focus only on evasions and Red Team and not the purple team counterpart. Anything that does not contribute to Red Team will be Open Sourced. The PowerShell loader which was used in BRc4 is now added here:
https://t.co/PLbYVX93X9

πŸ”— https://github.com/paranoidninja/Brute-Ratel-C4-Community-Kit

πŸ₯ [ tweet ]
Offensive Xwitter
😈 [ adamsvoboda, Adam Svoboda ] Want to dump LSASS but dealing with MDE/ATP and ASR rules? Learn how to extract a list of whitelisted exclusion paths from Defender's signature update files in this blog post: https://t.co/08Uo0UpQcm πŸ”— https://adamsvoboda.net/extracting…
😈 [ HackingLZ, Justin Elze ]

The original research has been out over a year now and flew under the radar. This might be useful for people wanting to look at Defender ASR rules/other things. All credit goes to others im just trying to get these semi structured https://t.co/c8J2rBDJKH

πŸ”— https://github.com/HackingLZ/ExtractedDefender

πŸ₯ [ tweet ]
😈 [ SecurePeacock, Christopher Peacock πŸ¦„ ]

Pentests and adversary emulation are not the same...

πŸ₯ [ tweet ]

ΠžΠΏΡΡ‚ΡŒ пСнтСстСров ΠΎΠ±ΠΈΠΆΠ°ΡŽΡ‚β€¦
πŸ”₯1😒1
УТС даТС нС смСшно
😈 [ praetorianlabs, Praetorian ]

Praetorian has developed and is releasing an open source tool ADFSRelay and NTLMParse, which can be used for performing relaying attacks targeting ADFS and analyzing NTLM messages respectively.

https://t.co/Zzxb5cUDsa

πŸ”— https://www.praetorian.com/blog/relaying-to-adfs-attacks/

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ s4ntiago_p, S4ntiagoP ]

New update to nanodump!

You can now force WerFault.exe to dump LSASS for you. Thanks to @asaf_gilboa for the original research.

https://t.co/R2lVXtd3uX

πŸ”— https://github.com/helpsystems/nanodump/commit/578116faea3d278d53d70ea932e2bbfe42569507

πŸ₯ [ tweet ]
😈 [ praetorianlabs, Praetorian ]

For the last 48 hours, our red teams have been leveraging the new dfscoerce security flaw to achieve domain admin with wild success. Here are some tips on detecting the activity

https://t.co/awSFENDvpO

#dfscoerce

πŸ”— https://www.praetorian.com/blog/how-to-detect-dfscoerce/

πŸ₯ [ tweet ]
😈 [ s4ntiago_p, S4ntiagoP ]

New update to nanodump!

You can now force WerFault.exe to dump LSASS for you. Thanks to @asaf_gilboa for the original research.

https://t.co/R2lVXtd3uX

πŸ”— https://github.com/helpsystems/nanodump/commit/578116faea3d278d53d70ea932e2bbfe42569507

πŸ₯ [ tweet ]