Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ mariuszbit, Mariusz Banach ]

πŸ”₯Working hard on a public release of my Malware Dev CI/CD toolkit

☒️ProtectMyTooling - Multi-Packer, supporting 23+ obfuscators
☒️RedBackdoorer - PE shellcode injection via 6 techniques
☒️RedWatermarker - IOC injector for implants tracking

Already available to my sponsors 😁✨

πŸ₯ [ tweet ]
πŸ‘1
😈 [ 0gtweet, Grzegorz Tworek ]

A new tool has arrived! 😎
Somewhat like netstat, but with timestamps for connections!⏱
The C source code, and the compiled exe, as usual - https://t.co/dz7BOPzOpW

πŸ”— https://github.com/gtworek/PSBits/tree/master/NetstatWithTimestamps

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ mubix, Rob Fuller ]

Internet Explorer EOL is today. We never really got along but that doesn’t mean I don’t respect the service you provided all red teamers as an initial infection vector for 27 years, good bye. #IEEoL

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

Post Compromise Active Directory Checklist
https://t.co/e85wblANnW

πŸ”— https://www.pwndefend.com/2021/09/15/post-compromise-active-directory-checklist/

πŸ₯ [ tweet ]
πŸ‘1
😈 [ SEKTOR7net, SEKTOR7 Institute ]

Hollowing a shell process to run a shellcode, all with just a 'dd'. Introducing DDExec by arget13

https://t.co/njGfKGSUmx

πŸ”— https://github.com/arget13/DDexec

πŸ₯ [ tweet ]
πŸ‘1
😈 [ FuzzySec, b33f | πŸ‡ΊπŸ‡¦βœŠ ]

This is great stuff! https://t.co/9hWHgRDu65

πŸ”— https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/

πŸ₯ [ tweet ][ quote ]
😈 [ Tyl0us, Matt Eidelberg ]

Seeing the crazy stuff people on my team do always inspires me. In this case, I am talking about @garrfoster for coming up with this amazing DACL parser for Active Directory. This is πŸ”₯! Check it out: https://t.co/SkkWfrVIYl #netsec #redteam

πŸ”— https://github.com/garrettfoster13/aced

πŸ₯ [ tweet ]
πŸ‘1
😈 [ Six2dez1, Six2dez ]

OneListForAll repo has reached 1K stars πŸ₯³ and I updated it just now with a few more wordlists repos, even the manually crafted for low-hanging fruits "onelistforallmicro.txt"

Also for the cryptobros I've added BTC address in the GH sponsors button πŸ˜‰

https://t.co/20iNJ1vtyS

πŸ”— https://github.com/six2dez/OneListForAll

πŸ₯ [ tweet ]
πŸ‘1
😈 [ GeKarantzas, NtSetInformationProcess() ]

https://t.co/w8mz6nft5M
Our latest research covered in a colaboratibe blog post. Views expressed belong to the researchers only amd do not represent the EU or present and future employers of people involved.
@C5pider @MDSecLabs @redcode_labs @SentinelOne

πŸ”— https://www.sentinelone.com/blog/research-paper-emulating-phineas-phisher-attacks-in-modern-edr-environments/

πŸ₯ [ tweet ]
πŸ‘1
😈 [ 0gtweet, Grzegorz Tworek ]

Definitely worth spreading and adding to your #LOLBIN lists.
Found it only because I have hit the same finding months later :P

Yet another MS-signed #lolbin to run your binaries with: "runexehelper.exe"

πŸ₯ [ tweet ][ quote ]
πŸ‘1
😈 [ an0n_r0, an0n ]

Sliver setup is effortless. Just tried it, currently the default config (without customization) works well against simple Defender. I think it's worth further playing. I don't think we should say goodbye to CS, but as an alternative, (not just because of this) it is promising.

πŸ₯ [ tweet ][ quote ]
πŸ‘2
😈 [ BCSecurity1, BC Security ]

A wave of Malicious Doc exploits
has been released over the last year.
Our newest blog from @_Hubbl3
discusses one of the most recent attacks,#Follina, which was only just patched by @Microsoft this week.

https://t.co/HX3TxFZhJ6

πŸ”— https://www.bc-security.org/post/maldocs-are-evolving/

πŸ₯ [ tweet ]
πŸ‘1
😈 [ ReconOne_, ReconOne ]

Do you want to focus on "Interesting" subdomains only? Try this πŸ‘†

#recontips #bugbountytips #recon #AttackSurface #subdomains #reconone

πŸ₯ [ tweet ]
😈 [ praetorianlabs, Praetorian ]

Check out our latest blog post where we discuss how we discovered a novel privilege escalation attack path and worked with AWS to clarify inaccuracies regarding IAM permissions

https://t.co/de5gIMPgfK

πŸ”— https://www.praetorian.com/blog/stsgetsessiontoken-role-chaining-in-aws/

πŸ₯ [ tweet ]
πŸ‘2
😈 [ N4k3dTurtl3, NA ]

"Don't try to prevent the breach, that is impossible. Instead, only try to realize the truth. There is no breach" -- Every bloody CISO

πŸ₯ [ tweet ]
πŸ‘1πŸ”₯1