Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ CaptMeelo, Meelo ]

I made some experiments over the past few days and I wanted share what I learned/observed.
#redteam #maldev #infosec
https://t.co/l1ANZbf6fg

๐Ÿ”— https://captmeelo.com/redteam/maldev/2022/11/07/cloning-signing.html

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ Ben0xA, Ben Ten (0xA) ]

Releasing a new tool: Orpheus! Bypasses most Kerberoast Detections (including my own). Blog post and video is up at @TrustedSec! Even used @HackingDave's old alias in the demo. https://t.co/qhP8r28s4K #infosec #security #kerberoast

๐Ÿ”— https://trustedsec.com/blog/the-art-of-bypassing-kerberoast-detections-with-orpheus/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ Idov31, Ido Veltzman ]

I'm happy to release Venom - A C++ single header file for evasive network communication which using a stolen browser's socket to perform all of its network activities and by that can make it hard to trace it back to the process.

https://t.co/AVxQbNru3Z

#infosec #CyberSecurity

๐Ÿ”— https://github.com/Idov31/Venom

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ 0x0SojalSec, Md Ismail ล ojal๎จ€ ]

Nuclei Automation.โš”๏ธ

https://t.co/CDes83cCD0

Full Nuclei automation script with logic explanation

#bugbountytips #infosec #nuclei #automation

๐Ÿ”— https://github.com/iamthefrogy/nerdbug

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1๐Ÿ˜1
๐Ÿ˜ˆ [ hetmehtaa, Het Mehta ]

Firefox Add-ons For Penetration Testers ๐ŸฆŠ

#Infosec #Firefox #Bugbounty #TheSecureEdge

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
๐Ÿ˜ˆ [ 0x0SojalSec, Md Ismail ล ojal๎จ€ ]

just scan for subdomain without downloding the tools:

curl -s -L https://github.com/cihanmehmet/sub.sh/raw/master/sub.sh | bash -s webscantest.com

#infosec #bugbounty #cybersec

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ kleiton0x7e, Kleiton Kurti ]

Created a blogpost & a PoC for a custom Sleep Mask Kit that obfuscates data within a beacon's stack, prior to custom sleeping, by leveraging CPU cycles.
A great approach against memory investigation.

๐Ÿ—’๏ธBlog: https://t.co/sop7XnF5tc

#cybersecurity #redteam #infosec

๐Ÿ”— https://whiteknightlabs.com/2023/05/02/masking-the-implant-with-stack-encryption/

๐Ÿฅ [ tweet ]
๐Ÿคฏ3
๐Ÿ˜ˆ [ kleiton0x7e, Kleiton Kurti ]

We took a Cobalt Strike profile, modified it, and bypassed Crowdstrike & Sophos without encrypting the shellcode. Also bypassed all published YARA rules, sleep detections, and string detections around a CS beacon.

Blog: https://t.co/m7FNOwV6Nx

#CyberSecurity #redteam #infosec

๐Ÿ”— https://whiteknightlabs.com/2023/05/23/unleashing-the-unseen-harnessing-the-power-of-cobalt-strike-profiles-for-edr-evasion/

๐Ÿฅ [ tweet ]
๐Ÿ‘1
๐Ÿ˜ˆ [ DarkCoderSc, Jean-Pierre LESUEUR ]

๐Ÿ›ธ๐Ÿ‘ฝ Interested in C2 over FTP(S)? Explore my new project, SharpFtpC2, which enables execution of shell commands on remote systems via FTP(S). Currently in beta and lacking encryption, but it's on the way: https://t.co/9Dkf19MhJL

#InfoSec #Malware #Network #Evasion #FTP

๐Ÿ”— https://github.com/DarkCoderSc/SharpFtpC2

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ R0h1rr1m, Furkan Gรถksel ]

I developed a Fileless Lateral Movement tool called NimExec. It changes service configuration to execute the payload via manually crafted RPC packets. It's the improved version of @JulioUrena 's SharpNoPSExec with Pass the Hash support. Enjoy!

#infosec
https://t.co/G6xeyHVmnf

๐Ÿ”— https://github.com/frkngksl/NimExec

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ kleiton0x7e, Kleiton Kurti ]

Came up with an improved version of WMIExec. By leveraging the Win32_ScheduledJob class, we can remotely create scheduled jobs. This way it's not required anymore to rely on port 139 and 445.

Github:

#CyberSecurity #redteam #infosec #infosecurity

๐Ÿ”— https://github.com/WKL-Sec/wmiexec/

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ r1cksec, r1cksec ]

New cheatsheets pushed ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿ”— https://github.com/r1cksec/cheatsheets

Including:

A well written blog post on how to read and parse LSASS memory dumps with PowerShell ๐Ÿ”

#infosec #cybersecurity #pentesting #redteam #lsass #windows

๐Ÿ”— https://powerseb.github.io/posts/LSASS-parsing-without-a-cat

๐Ÿฅ [ tweet ]
๐Ÿ‘4
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ˜ˆ [ bishopfox, Bishop Fox ]

We just published a detailed analysis of #CVE-2023-3519, which we previously wrote about. Today, weโ€™re going even further into how this #RCE vulnerability can be exploited.

Our team created a #python script for generating shellcode given the fixup address and callback URL by calling nasm from Python. The final #exploit with addresses for VPX version 13.1-48.47 is available on our #GitHub.

๐Ÿ”— bfx.social/3YjMxpz

#infosec #Citrix

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ4
๐Ÿ˜ˆ [ Idov31, Ido Veltzman ]

Part 5 of Lord Of The Ring0 is out!

On this part, I explained how APC and thread injection made from the kernel to a user mode process, IRP & SSDT hook, why they don't work anymore (and their alternatives)

#infosec #CyberSecurity

๐Ÿ”— https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
๐Ÿ˜ˆ [ Kleiton Kurti @kleiton0x7e ]

Spent some time reversing undocumented Syscalls residing in Kernel32/Ntdll and created a PoC for proxying DLL loads. This leads to a clean call stack as the return address pointing to shellcode won't be pushed to stack.

#CyberSecurity #redteam #infosec

๐Ÿ”— https://github.com/kleiton0x00/Proxy-DLL-Loads

๐Ÿฅ [ tweet ]
๐Ÿ‘4๐Ÿ”ฅ1
๐Ÿ˜ˆ [ Ido Veltzman @Idov31 ]

Weekly Nidhogg update
Driver hiding feature is also finished and live in the dev branch: :)
On the photos you can see the before and after in DriverView (From Nirsoft's tools)

๐Ÿ”— https://github.com/Idov31/Nidhogg/tree/dev

#infosec #CyberSecurity

๐Ÿฅ [ tweet ]
๐Ÿ‘4
๐Ÿ˜ˆ [ WHOAMI @wh0amitz ]

To audit the security of read-only domain controllers, I created the SharpRODC project, a simple .NET tool for RODC-related misconfigurations.

๐Ÿ”— https://github.com/wh0amitz/SharpRODC

#infosec #redteam #cybersecurity #pentesting

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ Ido Veltzman @Idov31 ]

There was no update for a while and the reason being a massive bug fixes, feature checking and a new feature (fun fact: it is the 23th feature!).
Now, you can use Nidhogg to dump credentials from LSASS!
Go check it out:

๐Ÿ”— https://github.com/Idov31/Nidhogg/tree/dev

#infosec #CyberSecurity

๐Ÿฅ [ tweet ]
๐Ÿ‘3๐Ÿ˜3