π [ ReconOne_, ReconOne ]
This is my quick nmap setup, to scan critical ports at fast rate πͺπ»π₯
#portscan #attacksurface #recontips #bugbountytips #recon #nmap
π₯ [ tweet ]
This is my quick nmap setup, to scan critical ports at fast rate πͺπ»π₯
#portscan #attacksurface #recontips #bugbountytips #recon #nmap
π₯ [ tweet ]
π [ tiraniddo, James Forshaw ]
Didn't realize .NET 5 introduced an ASN.1 reader/writer. Also available for Framework from nuget. Pretty convenient if you need a quick ASN.1 parser :-) https://t.co/H7a1YlMyNK
π https://docs.microsoft.com/en-us/dotnet/api/system.formats.asn1
π₯ [ tweet ]
Didn't realize .NET 5 introduced an ASN.1 reader/writer. Also available for Framework from nuget. Pretty convenient if you need a quick ASN.1 parser :-) https://t.co/H7a1YlMyNK
π https://docs.microsoft.com/en-us/dotnet/api/system.formats.asn1
π₯ [ tweet ]
π1
π [ ShitSecure, S3cur3Th1sSh1t ]
Cortex XDR. Try to execute:
"C:\windows\system32\calc.exe kerberoast /format:hashcat /outfile:C:\temp\kerb.txt"
Dynamic analysis shows -> Dangerous Hacktool. Calculator is very evil. π€
*hust* modifying parameter names for Rubeus π
π₯ [ tweet ]
Cortex XDR. Try to execute:
"C:\windows\system32\calc.exe kerberoast /format:hashcat /outfile:C:\temp\kerb.txt"
Dynamic analysis shows -> Dangerous Hacktool. Calculator is very evil. π€
*hust* modifying parameter names for Rubeus π
π₯ [ tweet ]
π1
π [ _wald0, Andy Robbins ]
This is a fantastic article on attack path analysis by Marius Elmiger (@m8r1us). Available in both English and German:
π¬π§ - https://t.co/DrNRhHzdWz
π©πͺ - https://t.co/JW2g2JwPOZ
π https://www.scip.ch/en/?labs.20220616
π https://www.scip.ch/?labs.20220616
π₯ [ tweet ][ quote ]
This is a fantastic article on attack path analysis by Marius Elmiger (@m8r1us). Available in both English and German:
π¬π§ - https://t.co/DrNRhHzdWz
π©πͺ - https://t.co/JW2g2JwPOZ
π https://www.scip.ch/en/?labs.20220616
π https://www.scip.ch/?labs.20220616
π₯ [ tweet ][ quote ]
π1
π [ Jean_Maes_1994, Jean ]
Spoof that stack boyz!
Stack spoofing now in arsenal kit
https://t.co/wTjcxvOBNI
π https://www.cobaltstrike.com/blog/arsenal-kit-update-thread-stack-spoofing/
π₯ [ tweet ]
Spoof that stack boyz!
Stack spoofing now in arsenal kit
https://t.co/wTjcxvOBNI
π https://www.cobaltstrike.com/blog/arsenal-kit-update-thread-stack-spoofing/
π₯ [ tweet ]
π1
π [ Haus3c, Ryan Hausknecht ]
I merged a PR from @ZephrFish to include support for CloudShell in PowerZure. https://t.co/M39udc9JR1
There's some very cool projects I have planned to release in the next coming months, some of which will affect PowerZure.
π https://github.com/hausec/PowerZure/tree/cloudshell
π₯ [ tweet ]
I merged a PR from @ZephrFish to include support for CloudShell in PowerZure. https://t.co/M39udc9JR1
There's some very cool projects I have planned to release in the next coming months, some of which will affect PowerZure.
π https://github.com/hausec/PowerZure/tree/cloudshell
π₯ [ tweet ]
π1
π [ DirectoryRanger, DirectoryRanger ]
An Introduction to Manual Active Directory Querying with Dsquery and Ldapsearch, by @Icemoonhsv
https://t.co/5BkxKQ1Ru1
π https://posts.specterops.io/an-introduction-to-manual-active-directory-querying-with-dsquery-and-ldapsearch-84943c13d7eb
π₯ [ tweet ]
An Introduction to Manual Active Directory Querying with Dsquery and Ldapsearch, by @Icemoonhsv
https://t.co/5BkxKQ1Ru1
π https://posts.specterops.io/an-introduction-to-manual-active-directory-querying-with-dsquery-and-ldapsearch-84943c13d7eb
π₯ [ tweet ]
π1
π [ DirectoryRanger, DirectoryRanger ]
Combining techniques to defeat Windows Defender and default Applocker rules
https://t.co/FGcEKnqMCw
π https://kymb0.github.io/malwaredev-bypass-av-xml/
π₯ [ tweet ]
Combining techniques to defeat Windows Defender and default Applocker rules
https://t.co/FGcEKnqMCw
π https://kymb0.github.io/malwaredev-bypass-av-xml/
π₯ [ tweet ]
π₯1
π [ DirectoryRanger, DirectoryRanger ]
Total Registry. Replacement for the Windows built-in Regedit.exe tool with several improvements, by @zodiacon
https://t.co/bNB6aXdcV4
π https://github.com/zodiacon/TotalRegistry
π₯ [ tweet ]
Total Registry. Replacement for the Windows built-in Regedit.exe tool with several improvements, by @zodiacon
https://t.co/bNB6aXdcV4
π https://github.com/zodiacon/TotalRegistry
π₯ [ tweet ]
π1
π [ DirectoryRanger, DirectoryRanger ]
Marshmallows & Kerberoasting
https://t.co/7VB1upHLU5
π https://redcanary.com/blog/marshmallows-and-kerberoasting/
π₯ [ tweet ]
Marshmallows & Kerberoasting
https://t.co/7VB1upHLU5
π https://redcanary.com/blog/marshmallows-and-kerberoasting/
π₯ [ tweet ]
π1
This media is not supported in your browser
VIEW IN TELEGRAM
π [ mrd0x, mr.d0x ]
Demo:
Injecting a JS keylogger using WebView2 into login[.]microsoftonline[.]com.
Better quality: https://t.co/rfJmr48s6n
Blog post: https://t.co/61FwQibZol
π https://imgur.com/a/Apl1DRl
π https://mrd0x.com/attacking-with-webview2-applications/
π₯ [ tweet ]
Demo:
Injecting a JS keylogger using WebView2 into login[.]microsoftonline[.]com.
Better quality: https://t.co/rfJmr48s6n
Blog post: https://t.co/61FwQibZol
π https://imgur.com/a/Apl1DRl
π https://mrd0x.com/attacking-with-webview2-applications/
π₯ [ tweet ]
π [ c3rb3ru5d3d53c, ΟΞ΅ΡΞ²Ξ΅ΡΞΌs - ΠΌΞ±βΟΞ±ΡΞ΅ ΡΞ΅sΡαΡΟΠ½Ξ΅Ρ ]
Hey guys, my #malware #analysis for absolute beginners guide just dropped!
β Completely Free
β Mistakes to Avoid
β Setting up your first VM
β Purpose Driven
β Where to get Malware Samples
β Creating a Portfolio
Recording a video soon too! π
https://t.co/zL8Sr0IzHG https://t.co/IYJV7mEatt
π https://c3rb3ru5d3d53c.github.io/docs/malware-analysis-beginner-guide/
π₯ [ tweet ][ quote ]
Hey guys, my #malware #analysis for absolute beginners guide just dropped!
β Completely Free
β Mistakes to Avoid
β Setting up your first VM
β Purpose Driven
β Where to get Malware Samples
β Creating a Portfolio
Recording a video soon too! π
https://t.co/zL8Sr0IzHG https://t.co/IYJV7mEatt
π https://c3rb3ru5d3d53c.github.io/docs/malware-analysis-beginner-guide/
π₯ [ tweet ][ quote ]
π [ Six2dez1, Six2dez ]
git clone https://t.co/yI71DCtPUF
cd cve-2022-22980-exp
mvn install
docker run -d -p 27017:27017 --name example-mongo mongo:latest
java -jar target/mongo-example-0.0.1-SNAPSHOT.jar
π https://github.com/jweny/cve-2022-22980-exp
π₯ [ tweet ]
git clone https://t.co/yI71DCtPUF
cd cve-2022-22980-exp
mvn install
docker run -d -p 27017:27017 --name example-mongo mongo:latest
java -jar target/mongo-example-0.0.1-SNAPSHOT.jar
π https://github.com/jweny/cve-2022-22980-exp
π₯ [ tweet ]
π [ clintgibler, Clint Gibler ]
ποΈ Awesome RCE Techniques
A list of techniques to achieve Remote Code Execution on various apps
Including:
CMS - Joomla, Wordpress
LMS - Moodle
Frameworks - JBoss, Tomcat
Other - GiTea, Jenkins
By @podalirius_
#bugbounty #bugbountytips
https://t.co/9kOdw4ammT
π https://github.com/p0dalirius/Awesome-RCE-techniques
π₯ [ tweet ]
ποΈ Awesome RCE Techniques
A list of techniques to achieve Remote Code Execution on various apps
Including:
CMS - Joomla, Wordpress
LMS - Moodle
Frameworks - JBoss, Tomcat
Other - GiTea, Jenkins
By @podalirius_
#bugbounty #bugbountytips
https://t.co/9kOdw4ammT
π https://github.com/p0dalirius/Awesome-RCE-techniques
π₯ [ tweet ]
π₯2
π [ Tyl0us, Matt Eidelberg ]
Mangle is a tool that manipulates aspects of compiled PEs to avoid detection from EDRs. It can strip out IoCs and inflate files to avoid detection and more. Check it out https://t.co/lpQCrDGnd1 #netsec #redteam #evasion
π https://github.com/optiv/Mangle
π₯ [ tweet ]
Mangle is a tool that manipulates aspects of compiled PEs to avoid detection from EDRs. It can strip out IoCs and inflate files to avoid detection and more. Check it out https://t.co/lpQCrDGnd1 #netsec #redteam #evasion
π https://github.com/optiv/Mangle
π₯ [ tweet ]
π₯1
π [ am0nsec, Paul L. ]
Been trying to find a way to dynamically (introspection?) resolve symbols within the kernel in order to experiment with undocumented/non-exported symbols with the help of PDBs. Getting the inspiration from reversing WinDBG/kdexts and the way they evaluate expressions.
π₯ [ tweet ]
Been trying to find a way to dynamically (introspection?) resolve symbols within the kernel in order to experiment with undocumented/non-exported symbols with the help of PDBs. Getting the inspiration from reversing WinDBG/kdexts and the way they evaluate expressions.
π₯ [ tweet ]
π [ adamsvoboda, Adam Svoboda ]
Want to dump LSASS but dealing with MDE/ATP and ASR rules? Learn how to extract a list of whitelisted exclusion paths from Defender's signature update files in this blog post: https://t.co/08Uo0UpQcm
π https://adamsvoboda.net/extracting-asr-rules/
π₯ [ tweet ]
Want to dump LSASS but dealing with MDE/ATP and ASR rules? Learn how to extract a list of whitelisted exclusion paths from Defender's signature update files in this blog post: https://t.co/08Uo0UpQcm
π https://adamsvoboda.net/extracting-asr-rules/
π₯ [ tweet ]
π₯1