Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ Max Harley @0xdab0 ]

Finally releasing a very beta version of my ADExplorerSnapshot Rust rewrite! There have been a ton of performance optimizations, edges added, and usability improvements since the quoted tweet. I'm really excited for people to start using and breaking it.

πŸ”— https://github.com/t94j0/adexplorersnapshot-rs

πŸ₯ [ tweet ][ quote ]
πŸ‘7πŸ₯±3
😈 [ 5pider @C5pider ]

I haven't posted anything about Havoc in a while so imma share something I have been working on. Wrote a custom VM/Interpreter (based on the RISC-V instruction set) to execute exploits and other arbitrary code.
The client is now fully extendable and scriptable via the Python API

πŸ₯ [ tweet ]
πŸ‘7
😈 [ Aurélien Chalot @Defte_ ]

Super interesting way of blinding EDR's consoles!!

πŸ”— https://tierzerosecurity.co.nz/2024/07/23/edr-telemetry-blocker.html

πŸ₯ [ tweet ]
πŸ”₯6πŸ‘2
😈 [ Print3M @Print3M_ ]

I wrote my first calc.exe "shellcode" in NASM. I find it a little strange that a lot of people write about malware development but almost no one talks about writing your own shellcode. I decided to write something on my own. (good comments, easy readable)

πŸ”— https://github.com/Print3M/shellcodes/blob/main/calc-exe.asm

πŸ₯ [ tweet ]

#для_самых_ΠΌΠ°Π»Π΅Π½ΡŒΠΊΠΈΡ…
πŸ‘7πŸ”₯1
😈 [ Alex Neff @al3x_n3ff ]

A new module just got merged into NetExec, which extracts the security Questions for local users πŸš€

Made by @Adamkadaban

If you want to know the details, you can read his blog post here:

πŸ”— https://hackback.zip/2024/05/08/Remotely-Dumping-Windows-Security-Questions-With-Impacket.html

πŸ₯ [ tweet ]
πŸ”₯12πŸ‘2
😈 [ Kaspersky @kaspersky ]

A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer β€” the browser that Microsoft supposedly laid to rest over a year ago.

Full story:
πŸ”— https://www.kaspersky.com/blog/zero-day-in-internet-explorer/51698/

πŸ₯ [ tweet ]
πŸ‘7πŸ”₯3😁3
😈 [ Check Point Research @_CPResearch_ ]

In this blog we introduce Thread-Name Calling - A new process injection technique using Thread Name. We also discuss various scenarios in which this not widely-known API can be used for offense.

Blog:
πŸ”— https://research.checkpoint.com/2024/thread-name-calling-using-thread-name-for-offense/

PoC:
πŸ”— https://github.com/hasherezade/thread_namecalling

πŸ₯ [ tweet ]
πŸ”₯4πŸ‘1πŸ₯±1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ ☣️ @0x6rss ]

My first blog post: Creating a PDF Dropper by Injecting Malicious JavaScript into a PDF with a Cobalt Strike Payload
For the source code and PoC, check out my blog post:πŸ‘‡

πŸ”— https://cti.monster/blog/2024/07/25/pdfdropper.html

πŸ₯ [ tweet ]
πŸ‘9😁5πŸ₯±5πŸ”₯2🍌2
😈 [ Alisa Esage Π¨Π΅Π²Ρ‡Π΅Π½ΠΊΠΎ @alisaesage ]

Nice little-known writeup on WhatsApp exploitation: < technically interesting for more than one reason

πŸ”— https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/

πŸ₯ [ tweet ]
πŸ‘6🍌3
😈 [ CICADA8Research @CICADA8Research ]

Hi friends, we felt that the topic of in-memory payload execution was not covered enough, so we've collected our own notes and hacks that we use on pentests to execute in-memory (reflective) payloads.

Enjoy reading!

πŸ”— https://cicada-8.medium.com/osep-unleashed-the-advance-of-in-memory-payload-execution-c03a4c0d610a

πŸ₯ [ tweet ]
πŸ”₯10πŸ‘7πŸ₯±3πŸ€”1🀯1
😈 [ Daniel @0x64616e ]

Binding to port 445 on Windows without WinDivert. This is highly useful for NTLM relaying. Big thanks to @zyn3rgy for the talk:

πŸ”— https://youtu.be/iBqOOkQGJEA

πŸ₯ [ tweet ][ quote ]
πŸ”₯9
πŸ₯±8πŸ”₯5
😈 [ TrustedSec @TrustedSec ]

Today, TrustedSec is releasing #Specula (our previously internal framework) into the world, which will transform the Outlook email client into a beaconing C2 agent. @oddvarmoe and @freefirex2 walk through how to use Specula in our latest blog!

πŸ”— https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change

πŸ₯ [ tweet ]
πŸ‘6πŸ”₯3
😈 [ PT SWARM @ptswarm ]

πŸ€– New article by our researcher Nikita Petrov: "From opcode to code: how AI chatbots can help with decompilation".

Read the blog post:

πŸ”— https://swarm.ptsecurity.com/from-opcode-to-code-how-ai-chatbots-can-help-with-decompilation/

πŸ₯ [ tweet ]
πŸ‘6
😈 [ Will Harris @parityzero ]

With Chrome 127 on Windows, we're introducing enhanced encryption to protect sensitive data, starting with your cookiesπŸͺ! This helps protect your personal information and keeps your online accounts secure from hackers. Read more about this protection:

πŸ”— https://security.googleblog.com/2024/07/improving-security-of-chrome-cookies-on.html

πŸ₯ [ tweet ]

Π³Π³, dploot
😒14πŸ‘2
😈 [ Dirk-jan @_dirkjan ]

New blog: Persisting on Entra ID applications and User Managed Identities with Federated Credentials.

In this blog we set up our own IdP with roadtools, allowing us to authenticate to apps and user managed identities with federated credentials πŸ˜€

πŸ”— https://dirkjanm.io/persisting-with-federated-credentials-entra-apps-managed-identities/

πŸ₯ [ tweet ]
πŸ‘5πŸ€”2