Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

[BLOG πŸ“] Some notes on how to automate the generation of Position Independent Shellcodes (without msfvenom windows/x64/exec) from object files in memory (by @NinjaParanoid) to be used in Threadless Process Injection (by @_EthicalChaos_) ⬇️

https://t.co/OFdHn7lR7I

πŸ”— https://snovvcrash.rocks/2023/02/14/pic-generation-for-threadless-injection.html

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ Threatlabz, Zscaler ThreatLabz ]

πŸ•΅οΈZscaler ThreatLabz has observed a campaign targeting a government organization with a new post exploitation framework named #Havoc. During this attack, the threat actors have made several #opsec failures: https://t.co/TcupRUwAYi

IOCs are available here: https://t.co/PD8vP73AKV

πŸ”— https://www.zscaler.com/blogs/security-research/havoc-across-cyberspace
πŸ”— https://github.com/threatlabz/iocs/tree/main/havoc

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ D1rkMtr, D1rkMtr ]

Github as C2 Demonstration , free API = free C2 Infrastructure
https://t.co/cZc2RtAJxn

πŸ”— https://github.com/TheD1rkMtr/GithubC2

πŸ₯ [ tweet ]
😈 [ PortSwiggerRes, PortSwigger Research ]

Server-side prototype pollution: Black-box detection without the DoS

https://t.co/6guKOcUmdS

πŸ”— https://portswigger.net/research/server-side-prototype-pollution

πŸ₯ [ tweet ]
😈 [ _zblurx, Thomas Seigneuret ]

https://t.co/1AxsR43O5Z
In order to learn Rust, I made a complete rewrite of @Defte_ Impersonate in plain Rust, and thanks to @g0h4n_0 it is now also usable as a dependency in your Rust projects (and he also made my code readable tho).

πŸ”— https://github.com/zblurx/impersonate-rs

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ EmpireC2Project, Empire ]

How about pop-out windows and a process tab? Only 6 more days until Empire 5.0.

πŸ₯ [ tweet ]

выглядит ΠΊΡ€ΡƒΡ‚ΠΎ, ΠΊΠΎΠ½Π΅Ρ‡Π½ΠΎ, Π½ΠΎ Ρ‚Π°ΠΊΠΎΠΉ ΠΎΠ½ Β«ΠΈΠ³Ρ€ΡƒΡˆΠ΅Ρ‡Π½Ρ‹ΠΉΒ» всС-Ρ‚Π°ΠΊΠΈ
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

Feeling guilty about steeling #DInvoke version of #RunPE from @_RastaMouse’s #SharpC2 for DInjector, but man this looks so πŸ”₯🀀

πŸ₯ [ tweet ][ quote ]
πŸ”₯5
😈 [ 0x6d69636b, Michael Schneider ]

I wrote about the Microsoft Defender configuration with Microsoft Intune and what's different compared to GPO.

Surprise: Non-admin users can read exclusion lists! https://t.co/50zkrFKkSC

πŸ”— https://www.scip.ch/en/?labs.20230216

πŸ₯ [ tweet ]
😈 [ decoder_it, ap ]

Short blog post on security issue in Windows group policy processing, fixed in CVE-2022-37955 https://t.co/fhoYftdOhQ

πŸ”— http://decoder.cloud/2023/02/16/eop-via-arbitrary-file-write-overwite-in-group-policy-client-gpsvc-cve-2022-37955/

πŸ₯ [ tweet ]
😈 [ pdiscoveryio, ProjectDiscovery.io ]

Our very own @olearycrew is new to the security engineering game - but he was able to use ProjectDiscovery tools to get his first bug bounty (from a Fortune 50 company no less).

Learn how: https://t.co/G64avj7AFM

#hackwithautomation #pdteam

πŸ”— https://blog.projectdiscovery.io/using-pd-tools-to-find-my-first-subdomain-takeover/

πŸ₯ [ tweet ]
😈 [ biskopp3n, biskopp3n ]

Released a new Backup Operator to Domain Admin tool. It contains 4 different methods for escalation, more methods will be added: https://t.co/UytiiAipIO

πŸ”— https://github.com/improsec/BackupOperatorToolkit

πŸ₯ [ tweet ]
Forwarded from APT
πŸ”₯ NimPlant Π‘2

This is a new light-weight, first-stage C2 implant written in Nim, with a supporting Python server and Next.JS web GUI.

https://github.com/chvancooten/NimPlant

#c2 #nim #python #redteam
πŸ”₯4
😈 [ 0x0SojalSec, Md Ismail Ε ojal ]

#oneliner

βœ… Subdomain enumeration
βœ… Full port scan
βœ… HTTP web server detection

#security #bugbountytips #portscan #subdomain #chaos

πŸ₯ [ tweet ]
😈 [ _RastaMouse, Rasta Mouse ]

ThreadlessInject updated with Nt APIs
https://t.co/GFghBMLedm

πŸ”— https://github.com/CCob/ThreadlessInject

πŸ₯ [ tweet ]
😈 [ bugch3ck, Jonas Vestberg ]

Disclosed today at @Disobey_fi - psexec from #impacket expose the target system for authenticated command execution as SYSTEM. That means any user that can authenticate over the network (usually Domain Users) can run code as SYSTEM over the network.

πŸ₯ [ tweet ]