😈 [ icyguider, icyguider ]
MEGA TOOL UPDATE! I've added a ton of new features to my C++ shellcode loader. These include GetSyscallStub integration, OLLVM support, Module Stomping, DLL Proxy generation, new sandbox evasion options, and storing your shellcode as an English word list!
https://t.co/XZUXwvfYk8
🔗 https://github.com/icyguider/Shhhloader
🐥 [ tweet ]
MEGA TOOL UPDATE! I've added a ton of new features to my C++ shellcode loader. These include GetSyscallStub integration, OLLVM support, Module Stomping, DLL Proxy generation, new sandbox evasion options, and storing your shellcode as an English word list!
https://t.co/XZUXwvfYk8
🔗 https://github.com/icyguider/Shhhloader
🐥 [ tweet ]
🔥1
😈 [ ORCA10K, ORCA ]
after some struggling, it was done, a 217 bytes custom dynamic shellcode, that can download and run your payload from a webpage : https://t.co/cSXEHDLBif
🔗 https://gitlab.com/ORCA000/d.rdynamicshellcode
🐥 [ tweet ]
after some struggling, it was done, a 217 bytes custom dynamic shellcode, that can download and run your payload from a webpage : https://t.co/cSXEHDLBif
🔗 https://gitlab.com/ORCA000/d.rdynamicshellcode
🐥 [ tweet ]
😈 [ Haus3c, Ryan ]
Pushed an update to PowerZure for some bug fixes but more importantly to remove the AzureAD PS Module requirement. It's all Graph API requests now for AAD functions. https://t.co/d7sGB1PO0K
🔗 https://github.com/hausec/PowerZure/commit/ff52222a1cfa6f756f384d53df6609f04e316a9a
🐥 [ tweet ]
Pushed an update to PowerZure for some bug fixes but more importantly to remove the AzureAD PS Module requirement. It's all Graph API requests now for AAD functions. https://t.co/d7sGB1PO0K
🔗 https://github.com/hausec/PowerZure/commit/ff52222a1cfa6f756f384d53df6609f04e316a9a
🐥 [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ x86matthew, x86matthew ]
ClipboardInject - Abusing the clipboard to inject code into remote processes
This PoC uses the clipboard to copy a payload into a remote process, eliminating the need for VirtualAllocEx / WriteProcessMemory.
https://t.co/eELCUgAg80
🔗 https://www.x86matthew.com/view_post?id=clipboard_inject
🐥 [ tweet ]
ClipboardInject - Abusing the clipboard to inject code into remote processes
This PoC uses the clipboard to copy a payload into a remote process, eliminating the need for VirtualAllocEx / WriteProcessMemory.
https://t.co/eELCUgAg80
🔗 https://www.x86matthew.com/view_post?id=clipboard_inject
🐥 [ tweet ]
😈 [ bohops, bohops ]
Sometimes, you just gotta
rundll32.exe -sta {clsid}
https://t.co/eaNSgO1sFy
🔗 https://lolbas-project.github.io/lolbas/Binaries/Rundll32/
🐥 [ tweet ]
Sometimes, you just gotta
rundll32.exe -sta {clsid}
https://t.co/eaNSgO1sFy
🔗 https://lolbas-project.github.io/lolbas/Binaries/Rundll32/
🐥 [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ bohops, bohops ]
Other great 'rundll32' resources:
- https://t.co/IWbd6yMonw
- https://t.co/mtpH4mRkfX
- https://t.co/eaNSgO1sFy
🔗 https://nasbench.medium.com/a-deep-dive-into-rundll32-exe-642344b41e90
🔗 https://redcanary.com/threat-detection-report/techniques/rundll32/
🔗 https://lolbas-project.github.io/lolbas/Binaries/Rundll32/
🐥 [ tweet ][ quote ]
Other great 'rundll32' resources:
- https://t.co/IWbd6yMonw
- https://t.co/mtpH4mRkfX
- https://t.co/eaNSgO1sFy
🔗 https://nasbench.medium.com/a-deep-dive-into-rundll32-exe-642344b41e90
🔗 https://redcanary.com/threat-detection-report/techniques/rundll32/
🔗 https://lolbas-project.github.io/lolbas/Binaries/Rundll32/
🐥 [ tweet ][ quote ]
😈 [ dr4k0nia, dr4k0nia ]
New blog post for HInvoke. It allows calling .NET runtime functions or accessing properties using only hashes as identifiers. Reducing obvious identifiers for analysts. Post also includes a little trick to avoid using PInvoke.
https://t.co/thYuk3NoQ5
🔗 https://dr4k0nia.github.io/dotnet/coding/2022/08/10/HInvoke-and-avoiding-PInvoke.html
🐥 [ tweet ]
New blog post for HInvoke. It allows calling .NET runtime functions or accessing properties using only hashes as identifiers. Reducing obvious identifiers for analysts. Post also includes a little trick to avoid using PInvoke.
https://t.co/thYuk3NoQ5
🔗 https://dr4k0nia.github.io/dotnet/coding/2022/08/10/HInvoke-and-avoiding-PInvoke.html
🐥 [ tweet ]
😈 [ praetorianlabs, Praetorian ]
Out of the inbox and into the fire. Modern and highly effective phishing techniques for 2022 and beyond.
https://t.co/wW2k2svkiC
#phish #redteam
🔗 https://www.praetorian.com/blog/modernized-phishing-techniques/
🐥 [ tweet ]
Out of the inbox and into the fire. Modern and highly effective phishing techniques for 2022 and beyond.
https://t.co/wW2k2svkiC
#phish #redteam
🔗 https://www.praetorian.com/blog/modernized-phishing-techniques/
🐥 [ tweet ]
🔥1
😈 [ d4rckh, d4rckh ]
Introducing gorilla! The ultimate wordlist tool. It is capable of scraping websites for words, extend existing ones using advanced mutations or compute passwords using patterns! #infosec #redteam
Get it here: https://t.co/H5sa2k3wsz
🔗 https://github.com/d4rckh/gorilla
🐥 [ tweet ]
Introducing gorilla! The ultimate wordlist tool. It is capable of scraping websites for words, extend existing ones using advanced mutations or compute passwords using patterns! #infosec #redteam
Get it here: https://t.co/H5sa2k3wsz
🔗 https://github.com/d4rckh/gorilla
🐥 [ tweet ]
😈 [ Jean_Maes_1994, Jean ]
decided to cut the blogpost shorter so its more digestible - part 1 is up now.
Disclaimer, I am not an expert in C so if I dun goofed reach out to correct me.
https://t.co/WzZ895si1R
🔗 https://redteamer.tips/help-i-need-to-write-code-in-c-part-1-setup-and-intro/
🐥 [ tweet ]
decided to cut the blogpost shorter so its more digestible - part 1 is up now.
Disclaimer, I am not an expert in C so if I dun goofed reach out to correct me.
https://t.co/WzZ895si1R
🔗 https://redteamer.tips/help-i-need-to-write-code-in-c-part-1-setup-and-intro/
🐥 [ tweet ]
😈 [ r4wd3r, Sebastián Castro (at Black Hat & DEFCON) ]
I had a blast releasing 'Suborner: A Windows Bribery for Invisible Persistence' at @BlackHatEvents.
Blog and GH of the attack:
Blog: https://t.co/FFZ39e4q7T
GitHub: https://t.co/TAi5zpAU2y
Thanks to all the attendees! #BHUSA #BHUSA2022 #DEFCON30 #DEFCON
🔗 https://r4wsec.com/notes/the_suborner_attack/
🔗 https://github.com/r4wd3r/Suborner
🐥 [ tweet ]
I had a blast releasing 'Suborner: A Windows Bribery for Invisible Persistence' at @BlackHatEvents.
Blog and GH of the attack:
Blog: https://t.co/FFZ39e4q7T
GitHub: https://t.co/TAi5zpAU2y
Thanks to all the attendees! #BHUSA #BHUSA2022 #DEFCON30 #DEFCON
🔗 https://r4wsec.com/notes/the_suborner_attack/
🔗 https://github.com/r4wd3r/Suborner
🐥 [ tweet ]
🔥1
😈 [ HuskyHacksMK, Matt | HuskyHacks ]
Good morning and happy friday! 📝New note is up on https://t.co/DIZF98hUtO
🛡 I am a Responsible Red Teamer. This is my manifesto.
https://t.co/MSXhvhIKMR
🔗 http://notes.huskyhacks.dev
🔗 https://notes.huskyhacks.dev/notes/the-responsible-red-teamers-manifesto
🐥 [ tweet ]
Good morning and happy friday! 📝New note is up on https://t.co/DIZF98hUtO
🛡 I am a Responsible Red Teamer. This is my manifesto.
https://t.co/MSXhvhIKMR
🔗 http://notes.huskyhacks.dev
🔗 https://notes.huskyhacks.dev/notes/the-responsible-red-teamers-manifesto
🐥 [ tweet ]
😈 [ kyleavery_, Kyle Avery ]
Incase you missed it, check out my new tool from #DEFCON30 !
https://t.co/tQLGr8Dvl6
🔗 https://github.com/kyleavery/AceLdr
🐥 [ tweet ]
Incase you missed it, check out my new tool from #DEFCON30 !
https://t.co/tQLGr8Dvl6
🔗 https://github.com/kyleavery/AceLdr
🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]
[#HackTip ⚒] Looking for a legitimate way of achieving #persistence on Windows? How about #AnyDesk silent deployment? 😉
🐥 [ tweet ]
[#HackTip ⚒] Looking for a legitimate way of achieving #persistence on Windows? How about #AnyDesk silent deployment? 😉
🐥 [ tweet ]
🔥2
😈 [ monoxgas, Nick Landers ]
Slides are up for our (w/ @tiraniddo) Kerberos LPE presentation from #blackhat2022. Hope you enjoy, and thank for to everyone who attended!
https://t.co/uojv3cI8np
🔗 https://i.blackhat.com/USA-22/Wednesday/US-22-Forshaw-Taking-Kerberos-To-The-Next-Level.pdf
🐥 [ tweet ]
Slides are up for our (w/ @tiraniddo) Kerberos LPE presentation from #blackhat2022. Hope you enjoy, and thank for to everyone who attended!
https://t.co/uojv3cI8np
🔗 https://i.blackhat.com/USA-22/Wednesday/US-22-Forshaw-Taking-Kerberos-To-The-Next-Level.pdf
🐥 [ tweet ]
😈 [ HenriNurmi, Henri Nurmi ]
In-memory token vault BOF for #CobaltStrike. Allows you to hot swap/re-use already stolen tokens without re-duplicating, and store tokens for later use in case of a person logs out. https://t.co/34iIm5XfAw
🔗 https://github.com/Henkru/cs-token-vault
🐥 [ tweet ]
In-memory token vault BOF for #CobaltStrike. Allows you to hot swap/re-use already stolen tokens without re-duplicating, and store tokens for later use in case of a person logs out. https://t.co/34iIm5XfAw
🔗 https://github.com/Henkru/cs-token-vault
🐥 [ tweet ]