Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ bmcder02, Blake ]

Recently I got asked to do an overview on ETW. I tried to cover everything useful for #DFIR, including multiple ways to capture ETW, useful providers and finding existing trace sessions.
#cybersecurity
https://t.co/3IWn9w6JuQ

πŸ”— http://bmcder.com/blog/a-begginers-all-inclusive-guide-to-etw

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

Detect and block Credential Dumps with Defender for Endpoint & Attack Surface Reduction #DFIR
https://t.co/8BZPvX83Ij

πŸ”— https://jeffreyappel.nl/detect-and-block-credential-dumps-with-defender-for-endpoint-attack-surface-reduction/

πŸ₯ [ tweet ]
😈 [ ntlmrelay, Ring3API ]

πŸ“ŒDismember tool by @liam_galvin - scan memory for secrets and more.
βš™οΈhttps://t.co/3anDqypiVb

#redteam #BlueTeam #threathunting #DFIR

πŸ”— https://github.com/liamg/dismember

πŸ₯ [ tweet ]
😈 [ cfalta, Christoph Falta ]

I wrote something to compare the content of two volume shadow copies. Let's hope that's useful πŸ˜… #dfir #PowerShell
https://t.co/ip15QPFaTq

πŸ”— https://github.com/cfalta/vsctool

πŸ₯ [ tweet ]
😈 [ an0n_r0, an0n ]

not a new one, but might be useful: Detecting Lateral Movement (and other) techniques through Event Logs by @jpcert_en
https://t.co/xIyta9ZESK
#DFIR

πŸ”— https://jpcertcc.github.io/ToolAnalysisResultSheet/

πŸ₯ [ tweet ]
😈 [ k1nd0ne, k1nd0ne ]

I am happy to release a new malware analysis tool.
VISION-Process.

A fast and cross platform Procmon visualization application written in Rust & TS.

https://t.co/M3GBy3Udb7

An demo with QBOT :
https://t.co/MruSaVYG2H

Happy Hunting !
@pr0xylife #DFIR

πŸ”— https://github.com/forensicxlab/VISION-ProcMon
πŸ”— https://www.forensicxlab.com/posts/vision-procmon/

πŸ₯ [ tweet ]
😈 [ Renzon @r3nzsec ]

I recently co-authored a @Unit42_Intel blog about a unique IR case in which a threat actor’s custom EDR bypass (using #BYOVD) exposed their toolkit, methods, and even identity. Check out how we unmasked them through an opsec slip-up! #dfir

πŸ”— https://unit42.paloaltonetworks.com/edr-bypass-extortion-attempt-thwarted/

πŸ₯ [ tweet ]
πŸ‘4😁2