Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ al3x_m3rcer, m3rcer ]

Here's the official release of Chisel-Strike: A .NET XOR encrypted Cobalt Strike Aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.

https://t.co/1wlwABP71E

#RedTeaming #CobaltStrike #Pentesting

🔗 https://github.com/m3rcer/Chisel-Strike

🐥 [ tweet ]
😈 [ Alh4zr3d, Alh4zr3d ]

Red Teamers, following my previous tweet on hiding procs, now we hide SSH connections:

"ssh -o UserKnownHostsFile=/dev/null -T user@target.com 'bash -i'"

Your user:
- is not added to /var/log/utmp
- won't appear in w or who cmd
- has no .profile or .bash_profile

#redteaming

🐥 [ tweet ]
🔥1
😈 [ naksyn, Diego Capriotti ]

Here's a pure Python implementation of MemoryModule technique to load a dll from memory. If using python is an option in your engagement, you can execute your dlls without injection or shellcode.
check it out!
https://t.co/N7yDE061Hs
#redteaming #DYORredteamtip #evasion

🔗 https://github.com/naksyn/PythonMemoryModule/

🐥 [ tweet ]
🔥1
😈 [ _atsika, Atsika ]

I've just started a blog on #maldev and #redteaming. Nothing fancy yet, just me trying to see if I've understood correctly.
The first post is about a custom version of GetModuleHandle and GetProcAddress in #go.
Check it out:

🔗 https://blog.atsika.ninja/posts/custom_getmodulehandle_getprocaddress/

🐥 [ tweet ]
🔥2
😈 [ CODE WHITE GmbH @codewhitesec ]

Struggeling to get those precious certificates with #certipy and AD CS instances that do not support web enrollment and do not expose CertSvc via RPC? @qtc_de has you covered and added functionality to use DCOM instead of good old RPC #redteaming

🔗 https://github.com/ly4k/Certipy/pull/201

🐥 [ tweet ]
🔥7