Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ LittleJoeTables, Moloch ]

Offline implant builds now supported out of the box in Sliver thanks to @capnspacehook

https://t.co/5MjdULcdXc

πŸ”— https://github.com/BishopFox/sliver/releases/tag/v1.5.21

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Public Cloud Services Comparison
https://t.co/JNYNTXm5O7

πŸ”— https://comparecloud.in/

πŸ₯ [ tweet ]
😈 [ _dirkjan, Dirk-jan ]

Apparently ldapdomaindump is part of the top ~3800 Python packages globally based on downloads. Happy that many people use it, though I suspect many have it as a dependency somewhere without knowing.

πŸ₯ [ tweet ]
😈 [ OscarAkaElvis, Γ“scar Alfonso DΓ­az ]

If you are interested in Binance data analysis, take a look to this awesome lib: https://t.co/uDftIcv5Cc

#binance #pandas #python3

πŸ”— https://github.com/nand0san/binpan_studio

πŸ₯ [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Another AMSI bypass alternative, usable from for example C++/C/Nim binaries as amsi.dll is not loaded there by default:

https://t.co/4isRAszjLC

πŸ”— https://waawaa.github.io/es/amsi_bypass-hooking-NtCreateSection/

πŸ₯ [ tweet ]
😈 [ FuzzySec, b33f ]

Write your Own Virtual Machine - https://t.co/uxU72UacRN

πŸ”— https://www.jmeiners.com/lc3-vm/

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

🧡(1/3) I get so excited every time I contribute to #impacket πŸ€— Anyways, here’s an upcoming update to secretsdump[.]py β†ͺ️ There’s now this -ldapfilter option that allows an attacker to #DCSync a bunch of user with a single shot 🧨

https://t.co/4ASCbqysj8

πŸ”— https://github.com/SecureAuthCorp/impacket/pull/1329

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ x86matthew, x86matthew ]

EmbedExeReg - Embedding an EXE inside a .REG file with automatic execution

Create a .reg file containing a hidden payload

https://t.co/4hPKoFWCk0

πŸ”— https://www.x86matthew.com/view_post?id=embed_exe_reg

πŸ₯ [ tweet ]
😈 [ metasploit, Metasploit Project ]

A new LDAP Query module! 🦾
https://t.co/payirwnUQf

πŸ”— https://youtu.be/yYlwZwhycwE

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

Have you ever looked for Open Redirects? Try this πŸ‘‡ πŸ’£

#recontips #AttackSurface #bugbountytips #bugbounty #openredirect #recon #httpx

πŸ₯ [ tweet ]
😈 [ SkelSec, SkelSec ]

"It's not a flat network, we have routers" - unnamed client

πŸ₯ [ tweet ]

πŸ€·πŸ»β€β™‚οΈ
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ dekel_paz, Dekel Paz ]

Uploaded a new script that adds vulnerabilities to #BloodHound by parsing scanner reports. Now you can search for vulnerable hosts in your network with paths to Domain Admins!
https://t.co/voN11IR3NL
P.S. did you catch the upcoming #BlueHound spoiler at the end?
@ZeroNetworks

πŸ”— https://github.com/zeronetworks/BloodHound-Tools/tree/main/VulnerabilitiesDataImport

πŸ₯ [ tweet ]
😈 [ Six2dez1, Six2dez ]

My mate @cybersecivan has released a small golang utility to grab the latest trending CVE's from @CVEtrends to easily pipe in your workflow πŸ”₯

Check it out!

https://t.co/6VlyN8ihxW

πŸ”— https://github.com/tr3ss/gofetch

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

🧡 (1/x) Reanimating ADCSPwn thread (in a simple way) ⏬

You all know this great tool by @_batsec_, but unfortunately Microsoft broke it with one of those anti-PetitPotam patches a while ago ⏬

https://t.co/LeYa5s5sfv

#lpe #adcs #petitpotam #webdav

πŸ”— https://github.com/bats3c/ADCSPwn/issues/3#issuecomment-901713533

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

🧡 (2/x) So that now the execution hangs like follows ⏬

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

🧡 (3/x) But guess what, there’s another super cool tool – Coercer (by @podalirius_) – which can be used to trigger the authentication with a different API that is not affected by the ad-hoc check provided in the patch ⏬

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

🧡 (4/x) And now *tada* I can get my machine account certificate on a fully patched Windows 10 ⏬

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

🧡 (5/x) Check out @Flangvik’s stream to know more about ADCSPwn usage: https://t.co/nG8gRKo3rn

πŸ”— https://youtu.be/W9pUCVxe59Q

πŸ₯ [ tweet ]