Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ d3lb3_, Julien Bedel ]

After January's patch of KeePass trigger abuse technique, I decided to take a deep dive into the software features, ending up with new ways to extract passwords through the the configuration file!

Details and mitigations below, enjoy the read โœŒ๏ธ
https://t.co/nhaad3p6dw

๐Ÿ”— https://d3lb3.github.io/keepass_triggers_arent_dead

๐Ÿฅ [ tweet ]
๐Ÿคฏ4๐Ÿ”ฅ2
๐Ÿ˜ˆ [ bohops, bohops ]

[Blog] No Alloc, No Problem: Leveraging Program Entry Points for Process Injection

An analysis of AddressOfEntryPoint and the 'new' ThreadQuerySetWin32StartAddress (ThreadQuery) process injection techniques

https://t.co/K9DuL5he0h

๐Ÿ”— https://bohops.com/2023/06/09/no-alloc-no-problem-leveraging-program-entry-points-for-process-injection/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ zimnyaatishina, zimnyaa ]

It's an okay language.
https://t.co/mr46UrK4CL

๐Ÿ”— https://tishina.in/execution/golang-winmaldev-basics

๐Ÿฅ [ tweet ]
Offensive Xwitter
๐Ÿ˜ˆ [ ZeroMemoryEx, V2 ] Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes https://t.co/UGt7cd1DYu ๐Ÿ”— https://github.com/ZeroMemoryEx/Terminator ๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ merterpreter, mert ]

SharpTerminatator is a C# port of ZeroMemoryEx's art piece called Terminator. It can be used with Cobalt Strike's execute-assembly or as a standalone executable.

All hail goes to him.

and ofcourse spyboy :)

https://t.co/m8KqH4kVAt

๐Ÿ”— https://github.com/mertdas/SharpTerminator

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ DarkCoderSc, Jean-Pierre LESUEUR ]

๐Ÿ›ธ๐Ÿ‘ฝ Interested in C2 over FTP(S)? Explore my new project, SharpFtpC2, which enables execution of shell commands on remote systems via FTP(S). Currently in beta and lacking encryption, but it's on the way: https://t.co/9Dkf19MhJL

#InfoSec #Malware #Network #Evasion #FTP

๐Ÿ”— https://github.com/DarkCoderSc/SharpFtpC2

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ 0xdeaddood, leandro ]

๐Ÿ“Want to know more? Check out my new blogpost! Forging tickets in 2023 with Impacket ๐ŸŽŸ๏ธ.
https://t.co/TYEiUMVNEc

๐Ÿ”— https://0xdeaddood.rocks/2023/05/11/forging-tickets-in-2023/

๐Ÿฅ [ tweet ]
๐Ÿ‘2
๐Ÿ˜ˆ [ mariuszbit, mgeeky | Mariusz Banach ]

Game cheaters don't get along with Red Teamers very well ๐Ÿ˜ญ

https://t.co/J4cktI3qDg

๐Ÿ”— https://www.unknowncheats.me/forum/anti-cheat-bypass/587585-terminator.html

๐Ÿฅ [ tweet ]

ะท. ั‹. ะบะพะผะผะตะฝั‚ั‹ ะฒ ั‚ะฒะธั‚ั‚ะตั€ ั‚ั€ะตะดะต ะดะพัั‚ะฐะฒะปััŽั‚ ะฝะต ะผะตะฝัŒัˆะต ะบะพะผะผะตะฝั‚ะพะฒ ะฝะฐ unknowncheats
๐Ÿ˜4
๐Ÿ˜ˆ [ _RastaMouse, Rasta Mouse ]

Dang 600,000...

๐Ÿฅ [ tweet ]

ะผั‹ ั‚ัƒั‚ ั‚ะฐะบะธะต ัะตััƒั€ะฝั‹ะต, ัƒ ะฝะฐั pbkdf2 ะฒั‹ัั‚ะฐะฒะปะตะฝ ะฒ 600ะบ ะธั‚ะตั€ะฐั†ะธะนโ€ฆ ะฟั€ะฐะฒะดะฐ ะฝะฐั ะปะพะผะฐัŽั‚ ั‡ะตั€ะตะท ะดะตะฝัŒ, ะฝะพ ัั‚ะพ ะดั€ัƒะณะพะต, ั‚ะพ-ะพ-ะพั‡ะฝะพโ€ฆ ัƒะฑะตะณะฐะนั‚ะต ะพั‚ ัั‚ะธั… ะฝะตะฐะดะตะบะฒะฐั‚ะพะฒ ะฝะฐ ัะตะปั„-ั…ะพัั‚ะตะด ะฑะธั‚ะฒะฐั€ะดะตะฝ, ะบัั‚ะฐั‚ะธ
๐Ÿ‘2๐Ÿ˜2
๐Ÿ˜ˆ [ an0n_r0, an0n ]

poor man's browser pivot through chrome remote debugging.๐Ÿ”ฅ

no need to inject into iexplorer anymore.๐Ÿ’ช

just came across this awesome solution shared by @NotMedic long ago: https://t.co/oPU8cZnecv

and this is also working with msedge (it shares the same chromium engine)!๐ŸŽ‰

๐Ÿ”— https://gist.github.com/NotMedic/b1ab7809eea94cc05513905b26964663

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ghostlulz1337, ghostlulz ]

If you want to learn more about Internal Pentesting & Red Teaming these are some really good resources

๐Ÿ”— https://book.hacktricks.xyz/
๐Ÿ”— https://www.thehacker.recipes/
๐Ÿ”— https://ppn.snovvcrash.rocks/
๐Ÿ”— https://cheats.philkeeble.com/
๐Ÿ”— https://dmcxblue.gitbook.io/
๐Ÿ”— https://www.vincentyiu.com/
๐Ÿ”— https://www.ired.team/

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ9
๐Ÿ˜ˆ [ ippsec, ippsec ]

Third part in my Configuring Parrot via Ansible Series is now up. This one configures both Firefox and Burpsuite, and hopefully will serve as a good intro to Jinja2 Templating, which makes customizing scripts/files a breeze. Check out the video here:

Part 1
๐Ÿ”— https://youtu.be/2y68gluYTcc

Part 2
๐Ÿ”— https://youtu.be/VRz_vtPBZzA

Part 3
๐Ÿ”— https://youtu.be/XDJB0TVKtNk

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3๐Ÿ‘1
๐Ÿ˜ˆ [ ZephrFish, Andy ]

Great post from @_RayRT on abusing different Active Directory object controls and how to detect them https://t.co/CFQvEuA0Rv #RedTeam #blueteam #purpleteam #cti

๐Ÿ”— http://labs.lares.com/securing-active-directory-via-acls/

๐Ÿฅ [ tweet ]
๐Ÿ‘6
๐Ÿ˜ˆ [ an0n_r0, an0n ]

Mini-HOWTO about setting up Full Disk Encryption with unattended auto-unlock using TPM2 w/ Secure Boot on Kali.

Useful for rogue devices (auto-connecting to C2), headless pentest boxes, etc. storing confidential information but lacking physical security.

https://t.co/vOXnlpZcm6

๐Ÿ”— https://gist.github.com/tothi/c7fdaaca3d61b7e3298863ada358fc1e

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ2
๐Ÿ˜ˆ [ virustotal, VirusTotal ]

In late 2022 we started monitoring PyPI, the most important Python repository. In a few weeks, we found dozens of suspicious packages. Here is our deep dive into PyPI hosted malware, by
@alexey_firsh: https://t.co/EdGdlOFw9L

๐Ÿ”— https://blog.virustotal.com/2023/06/inside-of-wasps-nest-deep-dive-into.html

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
๐Ÿ˜ˆ [ d4rksystem, Kyle Cucci ]

Really nice analysis from @voidsec of the vulnerable driver used by Spybot's Terminator tool.

https://t.co/08M2Dr5AMF

๐Ÿ”— https://voidsec.com/reverse-engineering-terminator-aka-zemana-antimalware-antilogger-driver/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ HackingLZ, Justin Elze ]

CS COFFLoader is public now thanks @_snus https://t.co/NIaNFWR47z https://t.co/nFahK7ZZX2

๐Ÿ”— https://github.com/trustedsec/CS_COFFLoader/

๐Ÿฅ [ tweet ]
๐Ÿ‘2