Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ _ZakSec, Zak ]

If you're interested by an alternative way to dump domain users' NT hashes and TGT without touching LSASS, take a look at the new Masky tool :)

Everything is explained in this article: https://t.co/jbcgupxvGi

Thanks @harmj0y, @tifkin_ and @ly4k_ for their amazing work on ADCS!

πŸ”— https://z4ksec.github.io/posts/masky-release-v0.0.3/

πŸ₯ [ tweet ]
😈 [ albertzsigovits, Albert Zsigovits ]

"Don't write malware in Nim please."

17dcfd678baabb152dad73f8d2af3a6fe3504d98667f92795897c164a5983a39

C:\Users\abc\Desktop\NimShellCodeLoader_Winx64\NimShellCodeLoader\bin\OEP_Hiijack_Inject_Load.exe

@malwrhunterteam @vxunderground @HuskyHacksMK @Hexacorn @0verfl0w_

πŸ₯ [ tweet ]
😈 [ s4ntiago_p, S4ntiagoP ]

Just finished implementing the new Shtinkering technique on nanodump, credits to @asaf_gilboa!
https://t.co/yEutAPBnS8

πŸ”— https://github.com/helpsystems/nanodump/pull/25

πŸ₯ [ tweet ]
😈 [ bohops, bohops ]

[Blog] Investigating .NET CLR Usage Log Tampering Techniques For EDR Evasion (Part 2)

https://t.co/02HD37quHe

I finally had the time to finish this post! Included are two 'new' Usage Log tampering techniques and additional defensive recommendations.

πŸ”— https://bohops.com/2022/08/22/investigating-net-clr-usage-log-tampering-techniques-for-edr-evasion-part-2/

πŸ₯ [ tweet ]
😈 [ ORCx41, ORCA ]

released a poc on etw session hijacking, blocking network events monitoring on procmon
https://t.co/E2BPjdVIBj

πŸ”— https://github.com/ORCx41/EtwSessionHijacking

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Creating Shellcode from any Code Using Visual Studio and C++
https://t.co/p10vUufQEH

πŸ”— https://www.codeproject.com/Articles/5304605/Creating-Shellcode-from-any-Code-Using-Visual-Stud

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

I don’t think it’s suitable for the upstream (just too lazy to clean up the code for a proper PR) but here’s a dirty PoC of semi-execute-assembly with #CrackMapExec. Enjoy 😈

https://t.co/1nfUudCpZI

πŸ”— https://github.com/snovvcrash/CrackMapExec/tree/dotnetassembly

πŸ₯ [ tweet ][ quote ]
😈 [ mansk1es, MANSK1ES ]

An article of mine called "Attacking on Behalf on Defense" which talks about abusing EDRs/XDRs to dump lsass (and much beyond), plus a bonus collab with @dec0ne.
https://t.co/9JxS9tjXxH

πŸ”— https://mansk1es.gitbook.io/edr-binary-abuse/

πŸ₯ [ tweet ]
😈 [ MsftSecIntel, Microsoft Security Intelligence ]

Microsoft has observed various threat actors adopting and integrating the Sliver C2 framework in intrusion campaigns withβ€”or as a replacement forβ€”Cobalt Strike. Get technical info and hunting queries from this blog by Microsoft Security Experts: https://t.co/FBXYRsif0K

πŸ”— https://msft.it/6010jdC1q

πŸ₯ [ tweet ]

Π»ΠΎΠ»
πŸ”₯1
😈 [ m8sec, Mike Brown ]

Just released a new blog post on "Exploiting PrintNightmare (CVE-2021-34527)" - which includes my version of the exploit that uses a built-in SMB server for payload delivery (no more open file shares!)

https://t.co/61dPOeD6ok

https://t.co/a9KXbbghe3

πŸ”— https://github.com/m8sec/CVE-2021-34527
πŸ”— https://infosecwriteups.com/exploiting-printnightmare-cve-2021-34527-10c6e0f5b83f?source=social.tw

πŸ₯ [ tweet ]
😈 [ PenTestPartners, Pen Test Partners ]

Last week our @_EthicalChaos_ promised something tasty: "Want to authenticate to RDP/Citrix using your abused ADCS certificate and live off the land? PIVert has got your back. Will be releasing soon!"
Well, here it is - Living off the land, AD CS style
https://t.co/SO1QK6fQ7y

πŸ”— https://www.pentestpartners.com/security-blog/living-off-the-land-ad-cs-style/

πŸ₯ [ tweet ]
😈 [ _mohemiv, Arseniy Sharoglazov ]

πŸ”₯ I've created a new Twitter account: @OffensiveTg

This account will try to share useful posts from Telegram or other non-Twitter sources.

🍏 May be run by the community later, and/or automation might be added.

πŸ”— https://twitter.com/offensivetg

πŸ₯ [ tweet ]

ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ рСкурсии!
πŸ‘Ž1
😈 [ akaclandestine, Clandestine ]

GitHub - khast3x/Redcloud: Automated Red Team Infrastructure deployement using Docker https://t.co/FPivhR11Fo

πŸ”— https://github.com/khast3x/Redcloud

πŸ₯ [ tweet ]
😈 [ _Kudaes_, Kurosh Dabbagh ]

Elevator (UAC bypass) is finally released: https://t.co/nuVm6aAFus. One of the most curious UAC bypasses that I've ever seen, and also it works like a charm. Give it a try and send me your feedback!

πŸ”— https://github.com/Kudaes/Elevator

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Harvesting Active Directory Credentials via HTTP Request Smuggling https://t.co/SYQVpKJ5WO

πŸ”— https://northwave-security.com/harvesting-active-directory-credentials-via-http-request-smuggling/

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ zux0x3a, Lawrence ε‹žε€«ζ–― ]

the beta version of https://t.co/X6JcXARx0u is live; what inside
βœ… online wiki in terminal style made for red teamers
βœ… can search for a specific topic (.e.g search "pass the hash")
βœ… you can look up specific modules for specific command line (e.g lookup mimikatz "golden")

πŸ”— http://terminal.ired.dev

πŸ₯ [ tweet ]
😈 [ embee_research, Matthew ]

In depth analysis of a 6-stage #asyncrat #malware loader using #cyberchef + #dnspyπŸ€

Persistent .lnk -> .py script -> 2nd .py script -> .NET DLL (reflection) -> .NET DLL (injected into msbuild.exe) -> .NET dll (custom obfuscation) -> .NET .exe (asyncrat)

https://t.co/e2Y5jHOOYy

πŸ”— https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader

πŸ₯ [ tweet ]