Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ ghostlulz1337, ghostlulz ]

Cool blog on abusing callback functions to execute shellcode. There are so many windows APIs that can be leveraged to execute your shellcode. Really cool stuff!

https://t.co/D1WJT80ehW

#redteam #infosec

πŸ”— http://ropgadget.com/posts/abusing_win_functions.html

πŸ₯ [ tweet ]
😈 [ al3x_m3rcer, m3rcer ]

Here's the official release of Chisel-Strike: A .NET XOR encrypted Cobalt Strike Aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.

https://t.co/1wlwABP71E

#RedTeaming #CobaltStrike #Pentesting

πŸ”— https://github.com/m3rcer/Chisel-Strike

πŸ₯ [ tweet ]
😈 [ C5pider, 5pider ]

Perform HTTP/s requests using WinHTTP and optional get response.
https://t.co/HAwhep2Pyv

πŸ”— https://gist.github.com/Cracked5pider/4f784ad7405eeda45a13a2b2638b85ec

πŸ₯ [ tweet ]
😈 [ _dirkjan, Dirk-jan ]

New blog: "Abusing forgotten permissions on computer objects in Active Directory".
The post is a dive into permissions that are set when you pre-create computer accounts the wrong way, why BloodHound missed those and how to abuse, fix, or monitor for this. https://t.co/T8WmiIoL53

πŸ”— https://dirkjanm.io/abusing-forgotten-permissions-on-precreated-computer-objects-in-active-directory/

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

P2P Remote Desktop - Portable, No Configuration or Installation Needed https://t.co/taaggUyfC0

πŸ”— https://github.com/miroslavpejic85/p2p

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

tokenduplicator: can also be used to access disconnected sessions, without knowing the password of the victim user https://t.co/VMeIQdwMdg

πŸ”— https://github.com/magnusstubman/tokenduplicator

πŸ₯ [ tweet ]
😈 [ M4yFly, Mayfly ]

GOAD pwning part4 - poison and relay
https://t.co/g4seCCWrif

πŸ”— https://mayfly277.github.io/posts/GOADv2-pwning-part4/

πŸ₯ [ tweet ]
😈 [ mikeloss, l0ss ]

Hey kids, you ever wanted to use Snaffler or Group3r via inlineExecuteAssembly or whatever, but couldn't because it used Environment.Exit() and that would kill your beacon? Well, I fixed that, so now it's not a problem any more. https://t.co/Ts8WFVojcY and https://t.co/QePyTfNcbm

πŸ”— http://github.com/SnaffCon/Snaffler
πŸ”— http://github.com/Group3r/Group3r

πŸ₯ [ tweet ]
😈 [ 0gtweet, Grzegorz Tworek ]

As a fan of non-obvious persistence mechanisms I had to try to collect (and categorize!) them all. It has just started, first 10 entries appeared, and more is coming each day.
I am happy to share it. Enjoy, contribute, use freely - https://t.co/PWb2ofSZjQ

πŸ”— https://persistence-info.github.io/

πŸ₯ [ tweet ]
😈 [ SkelSec, SkelSec ]

YOUπŸ‘DON'TπŸ‘NEEDπŸ‘AπŸ‘REDTEAMπŸ‘
The security consultants identified that the domain controller XXX uses an outdated Apache server running as β€œNT/SYSTEM” which uses the default β€œcgi-bin” folder to host the application logic. This folder was found to be writable by any domain user..

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ podalirius_, Podalirius ]

Want to play around with @Microsoft #RPC? I'm releasing a few #tools that I use in my lab πŸ‘Œ

Today I'm releasing a tool that lists all open #SMB #pipes remotely in live mode. With this you can easily see which pipes will open when starting services. πŸ₯³

https://t.co/PWNQFkGDag

πŸ”— https://github.com/p0dalirius/microsoft-rpc-fuzzing-tools

πŸ₯ [ tweet ]
😈 [ mariuszbit, mgeeky | Mariusz Banach ]

- "... and then he said to sign my malware.exe with faked Microsoft cert to evade AVs/EDRs. Would you believe?"

(οΏ£yβ–½οΏ£)β•­ Ohohoho.....

Sign-Artifact.ps1 - based on @mattifestation research & implementation shamelessly borrowed here:

https://t.co/6LAVgCrOVN

πŸ”— https://github.com/mgeeky/Penetration-Testing-Tools/tree/master/red-teaming/Self-Signed%20Threat

πŸ₯ [ tweet ]
😈 [ an0n_r0, an0n ]

another episode of my Sliver C2 testing. off-the-shelf bypass techniques like the unhook-bof in the official Armory seems to be useful and performs well against some modern EDR/AV products. seems like it is less painful than with Cobalt Strike. :)

πŸ₯ [ tweet ]
😈 [ harmj0y, Will Schroeder ]

After an awesome back and forth with @cnotin and @SteveSyfuhs on the effects of "TokenLeakDetectDelaySecs" and "Protected Users" for mitigating token theft, I've updated the Koh README to reflect this (and updated the post to point to the README as well) https://t.co/AGViEV0stq

πŸ”— https://github.com/GhostPack/Koh/blob/main/README.md#mitigations

πŸ₯ [ tweet ]
😈 [ ptswarm, PT SWARM ]

πŸ’₯ New attack! Our researcher Arseniy Sharoglazov discovered a PHP's Arbitrary Object Instantiation with no user-defined classes. It was turned to RCE!

Read the research: https://t.co/PJZHLRM8xq

πŸ”— https://swarm.ptsecurity.com/exploiting-arbitrary-object-instantiations/

πŸ₯ [ tweet ]
😈 [ 404death, sailay(valen) ]

I just recently found out the way
XSS <a> tag without user action
<a/autofocus/onfocus=alert(0) href>valen</a>
<a/href="#"/autofocus/onfocus=alert`valen`>you don't need user action on a tag</a>

Tested on:
https://t.co/RkGdfpNWli
https://t.co/bPvMeBlba1

πŸ”— https://xss-game.appspot.com/level1/frame
πŸ”— http://testphp.vulnweb.com/search.php?test=query

πŸ₯ [ tweet ]