๐ [ pdiscoveryio, ProjectDiscovery.io ]
The Ultimate Guide to Finding Bugs With Nuclei by @v3natoris
https://t.co/2GY3QZlTft
#hackwithautomation #cybersecurity #infosec #bugbounty
๐ https://blog.projectdiscovery.io/ultimate-nuclei-guide/
๐ฅ [ tweet ]
The Ultimate Guide to Finding Bugs With Nuclei by @v3natoris
https://t.co/2GY3QZlTft
#hackwithautomation #cybersecurity #infosec #bugbounty
๐ https://blog.projectdiscovery.io/ultimate-nuclei-guide/
๐ฅ [ tweet ]
๐ [ CaptMeelo, Meelo ]
I made some experiments over the past few days and I wanted share what I learned/observed.
#redteam #maldev #infosec
https://t.co/l1ANZbf6fg
๐ https://captmeelo.com/redteam/maldev/2022/11/07/cloning-signing.html
๐ฅ [ tweet ]
I made some experiments over the past few days and I wanted share what I learned/observed.
#redteam #maldev #infosec
https://t.co/l1ANZbf6fg
๐ https://captmeelo.com/redteam/maldev/2022/11/07/cloning-signing.html
๐ฅ [ tweet ]
๐ [ Ben0xA, Ben Ten (0xA) ]
Releasing a new tool: Orpheus! Bypasses most Kerberoast Detections (including my own). Blog post and video is up at @TrustedSec! Even used @HackingDave's old alias in the demo. https://t.co/qhP8r28s4K #infosec #security #kerberoast
๐ https://trustedsec.com/blog/the-art-of-bypassing-kerberoast-detections-with-orpheus/
๐ฅ [ tweet ]
Releasing a new tool: Orpheus! Bypasses most Kerberoast Detections (including my own). Blog post and video is up at @TrustedSec! Even used @HackingDave's old alias in the demo. https://t.co/qhP8r28s4K #infosec #security #kerberoast
๐ https://trustedsec.com/blog/the-art-of-bypassing-kerberoast-detections-with-orpheus/
๐ฅ [ tweet ]
๐ [ Idov31, Ido Veltzman ]
I'm happy to release Venom - A C++ single header file for evasive network communication which using a stolen browser's socket to perform all of its network activities and by that can make it hard to trace it back to the process.
https://t.co/AVxQbNru3Z
#infosec #CyberSecurity
๐ https://github.com/Idov31/Venom
๐ฅ [ tweet ]
I'm happy to release Venom - A C++ single header file for evasive network communication which using a stolen browser's socket to perform all of its network activities and by that can make it hard to trace it back to the process.
https://t.co/AVxQbNru3Z
#infosec #CyberSecurity
๐ https://github.com/Idov31/Venom
๐ฅ [ tweet ]
๐ [ 0x0SojalSec, Md Ismail ล ojal๎จ ]
Nuclei Automation.โ๏ธ
https://t.co/CDes83cCD0
Full Nuclei automation script with logic explanation
#bugbountytips #infosec #nuclei #automation
๐ https://github.com/iamthefrogy/nerdbug
๐ฅ [ tweet ]
Nuclei Automation.โ๏ธ
https://t.co/CDes83cCD0
Full Nuclei automation script with logic explanation
#bugbountytips #infosec #nuclei #automation
๐ https://github.com/iamthefrogy/nerdbug
๐ฅ [ tweet ]
๐ฅ1๐1
๐ [ hetmehtaa, Het Mehta ]
Firefox Add-ons For Penetration Testers ๐ฆ
#Infosec #Firefox #Bugbounty #TheSecureEdge
๐ฅ [ tweet ]
Firefox Add-ons For Penetration Testers ๐ฆ
#Infosec #Firefox #Bugbounty #TheSecureEdge
๐ฅ [ tweet ]
๐ฅ1
๐ [ 0x0SojalSec, Md Ismail ล ojal๎จ ]
just scan for subdomain without downloding the tools:
๐ฅ [ tweet ]
just scan for subdomain without downloding the tools:
curl -s -L https://github.com/cihanmehmet/sub.sh/raw/master/sub.sh | bash -s webscantest.com#infosec #bugbounty #cybersec
๐ฅ [ tweet ]
๐ [ kleiton0x7e, Kleiton Kurti ]
Created a blogpost & a PoC for a custom Sleep Mask Kit that obfuscates data within a beacon's stack, prior to custom sleeping, by leveraging CPU cycles.
A great approach against memory investigation.
๐๏ธBlog: https://t.co/sop7XnF5tc
#cybersecurity #redteam #infosec
๐ https://whiteknightlabs.com/2023/05/02/masking-the-implant-with-stack-encryption/
๐ฅ [ tweet ]
Created a blogpost & a PoC for a custom Sleep Mask Kit that obfuscates data within a beacon's stack, prior to custom sleeping, by leveraging CPU cycles.
A great approach against memory investigation.
๐๏ธBlog: https://t.co/sop7XnF5tc
#cybersecurity #redteam #infosec
๐ https://whiteknightlabs.com/2023/05/02/masking-the-implant-with-stack-encryption/
๐ฅ [ tweet ]
๐คฏ3
๐ [ kleiton0x7e, Kleiton Kurti ]
We took a Cobalt Strike profile, modified it, and bypassed Crowdstrike & Sophos without encrypting the shellcode. Also bypassed all published YARA rules, sleep detections, and string detections around a CS beacon.
Blog: https://t.co/m7FNOwV6Nx
#CyberSecurity #redteam #infosec
๐ https://whiteknightlabs.com/2023/05/23/unleashing-the-unseen-harnessing-the-power-of-cobalt-strike-profiles-for-edr-evasion/
๐ฅ [ tweet ]
We took a Cobalt Strike profile, modified it, and bypassed Crowdstrike & Sophos without encrypting the shellcode. Also bypassed all published YARA rules, sleep detections, and string detections around a CS beacon.
Blog: https://t.co/m7FNOwV6Nx
#CyberSecurity #redteam #infosec
๐ https://whiteknightlabs.com/2023/05/23/unleashing-the-unseen-harnessing-the-power-of-cobalt-strike-profiles-for-edr-evasion/
๐ฅ [ tweet ]
๐1
๐ [ DarkCoderSc, Jean-Pierre LESUEUR ]
๐ธ๐ฝ Interested in C2 over FTP(S)? Explore my new project, SharpFtpC2, which enables execution of shell commands on remote systems via FTP(S). Currently in beta and lacking encryption, but it's on the way: https://t.co/9Dkf19MhJL
#InfoSec #Malware #Network #Evasion #FTP
๐ https://github.com/DarkCoderSc/SharpFtpC2
๐ฅ [ tweet ]
๐ธ๐ฝ Interested in C2 over FTP(S)? Explore my new project, SharpFtpC2, which enables execution of shell commands on remote systems via FTP(S). Currently in beta and lacking encryption, but it's on the way: https://t.co/9Dkf19MhJL
#InfoSec #Malware #Network #Evasion #FTP
๐ https://github.com/DarkCoderSc/SharpFtpC2
๐ฅ [ tweet ]
๐ฅ3
๐ [ R0h1rr1m, Furkan Gรถksel ]
I developed a Fileless Lateral Movement tool called NimExec. It changes service configuration to execute the payload via manually crafted RPC packets. It's the improved version of @JulioUrena 's SharpNoPSExec with Pass the Hash support. Enjoy!
#infosec
https://t.co/G6xeyHVmnf
๐ https://github.com/frkngksl/NimExec
๐ฅ [ tweet ]
I developed a Fileless Lateral Movement tool called NimExec. It changes service configuration to execute the payload via manually crafted RPC packets. It's the improved version of @JulioUrena 's SharpNoPSExec with Pass the Hash support. Enjoy!
#infosec
https://t.co/G6xeyHVmnf
๐ https://github.com/frkngksl/NimExec
๐ฅ [ tweet ]
๐ [ kleiton0x7e, Kleiton Kurti ]
Came up with an improved version of WMIExec. By leveraging the Win32_ScheduledJob class, we can remotely create scheduled jobs. This way it's not required anymore to rely on port 139 and 445.
Github:
#CyberSecurity #redteam #infosec #infosecurity
๐ https://github.com/WKL-Sec/wmiexec/
๐ฅ [ tweet ]
Came up with an improved version of WMIExec. By leveraging the Win32_ScheduledJob class, we can remotely create scheduled jobs. This way it's not required anymore to rely on port 139 and 445.
Github:
#CyberSecurity #redteam #infosec #infosecurity
๐ https://github.com/WKL-Sec/wmiexec/
๐ฅ [ tweet ]
๐ฅ3
๐ [ r1cksec, r1cksec ]
New cheatsheets pushed ๐ต๏ธโโ๏ธ
๐ https://github.com/r1cksec/cheatsheets
Including:
A well written blog post on how to read and parse LSASS memory dumps with PowerShell ๐
#infosec #cybersecurity #pentesting #redteam #lsass #windows
๐ https://powerseb.github.io/posts/LSASS-parsing-without-a-cat
๐ฅ [ tweet ]
New cheatsheets pushed ๐ต๏ธโโ๏ธ
๐ https://github.com/r1cksec/cheatsheets
Including:
A well written blog post on how to read and parse LSASS memory dumps with PowerShell ๐
#infosec #cybersecurity #pentesting #redteam #lsass #windows
๐ https://powerseb.github.io/posts/LSASS-parsing-without-a-cat
๐ฅ [ tweet ]
๐4
This media is not supported in your browser
VIEW IN TELEGRAM
๐ [ bishopfox, Bishop Fox ]
We just published a detailed analysis of #CVE-2023-3519, which we previously wrote about. Today, weโre going even further into how this #RCE vulnerability can be exploited.
Our team created a #python script for generating shellcode given the fixup address and callback URL by calling nasm from Python. The final #exploit with addresses for VPX version 13.1-48.47 is available on our #GitHub.
๐ bfx.social/3YjMxpz
#infosec #Citrix
๐ฅ [ tweet ]
We just published a detailed analysis of #CVE-2023-3519, which we previously wrote about. Today, weโre going even further into how this #RCE vulnerability can be exploited.
Our team created a #python script for generating shellcode given the fixup address and callback URL by calling nasm from Python. The final #exploit with addresses for VPX version 13.1-48.47 is available on our #GitHub.
๐ bfx.social/3YjMxpz
#infosec #Citrix
๐ฅ [ tweet ]
๐ฅ4
๐ [ Idov31, Ido Veltzman ]
Part 5 of Lord Of The Ring0 is out!
On this part, I explained how APC and thread injection made from the kernel to a user mode process, IRP & SSDT hook, why they don't work anymore (and their alternatives)
#infosec #CyberSecurity
๐ https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
๐ฅ [ tweet ]
Part 5 of Lord Of The Ring0 is out!
On this part, I explained how APC and thread injection made from the kernel to a user mode process, IRP & SSDT hook, why they don't work anymore (and their alternatives)
#infosec #CyberSecurity
๐ https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
๐ฅ [ tweet ]
๐ฅ1
๐ [ Kleiton Kurti @kleiton0x7e ]
Spent some time reversing undocumented Syscalls residing in Kernel32/Ntdll and created a PoC for proxying DLL loads. This leads to a clean call stack as the return address pointing to shellcode won't be pushed to stack.
#CyberSecurity #redteam #infosec
๐ https://github.com/kleiton0x00/Proxy-DLL-Loads
๐ฅ [ tweet ]
Spent some time reversing undocumented Syscalls residing in Kernel32/Ntdll and created a PoC for proxying DLL loads. This leads to a clean call stack as the return address pointing to shellcode won't be pushed to stack.
#CyberSecurity #redteam #infosec
๐ https://github.com/kleiton0x00/Proxy-DLL-Loads
๐ฅ [ tweet ]
๐4๐ฅ1
๐ [ Ido Veltzman @Idov31 ]
Weekly Nidhogg update
Driver hiding feature is also finished and live in the dev branch: :)
On the photos you can see the before and after in DriverView (From Nirsoft's tools)
๐ https://github.com/Idov31/Nidhogg/tree/dev
#infosec #CyberSecurity
๐ฅ [ tweet ]
Weekly Nidhogg update
Driver hiding feature is also finished and live in the dev branch: :)
On the photos you can see the before and after in DriverView (From Nirsoft's tools)
๐ https://github.com/Idov31/Nidhogg/tree/dev
#infosec #CyberSecurity
๐ฅ [ tweet ]
๐4
๐ [ WHOAMI @wh0amitz ]
To audit the security of read-only domain controllers, I created the SharpRODC project, a simple .NET tool for RODC-related misconfigurations.
๐ https://github.com/wh0amitz/SharpRODC
#infosec #redteam #cybersecurity #pentesting
๐ฅ [ tweet ]
To audit the security of read-only domain controllers, I created the SharpRODC project, a simple .NET tool for RODC-related misconfigurations.
๐ https://github.com/wh0amitz/SharpRODC
#infosec #redteam #cybersecurity #pentesting
๐ฅ [ tweet ]
๐ฅ3
Offensive Xwitter
๐ [ SafeBreach @safebreach ] This is huge. As presented at #BlackHatEurope today, see how SafeBreach Labs researcher Alon Leviev developed a brand new set of highly flexible process injection techniques that are able to completely bypass leading EDR solutions.โฆ
๐ [ Shashwat Shah ๐ฎ๐ณ @0xEr3bus ]
Just crafted a beacon object file for the 8th variant of the powerful process injection technique by @_0xDeku. An exciting journey into the Windows Thread Pool!
#cybersecurity #redteam #infosec #cobaltstrike
๐ https://github.com/0xEr3bus/PoolPartyBof
๐ฅ [ tweet ]
Just crafted a beacon object file for the 8th variant of the powerful process injection technique by @_0xDeku. An exciting journey into the Windows Thread Pool!
#cybersecurity #redteam #infosec #cobaltstrike
๐ https://github.com/0xEr3bus/PoolPartyBof
๐ฅ [ tweet ]
๐2
๐ [ Ido Veltzman @Idov31 ]
There was no update for a while and the reason being a massive bug fixes, feature checking and a new feature (fun fact: it is the 23th feature!).
Now, you can use Nidhogg to dump credentials from LSASS!
Go check it out:
๐ https://github.com/Idov31/Nidhogg/tree/dev
#infosec #CyberSecurity
๐ฅ [ tweet ]
There was no update for a while and the reason being a massive bug fixes, feature checking and a new feature (fun fact: it is the 23th feature!).
Now, you can use Nidhogg to dump credentials from LSASS!
Go check it out:
๐ https://github.com/Idov31/Nidhogg/tree/dev
#infosec #CyberSecurity
๐ฅ [ tweet ]
๐3๐3