Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ Haus3c, Ryan ]

Pushed an update to PowerZure for some bug fixes but more importantly to remove the AzureAD PS Module requirement. It's all Graph API requests now for AAD functions. https://t.co/d7sGB1PO0K

🔗 https://github.com/hausec/PowerZure/commit/ff52222a1cfa6f756f384d53df6609f04e316a9a

🐥 [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ x86matthew, x86matthew ]

ClipboardInject - Abusing the clipboard to inject code into remote processes

This PoC uses the clipboard to copy a payload into a remote process, eliminating the need for VirtualAllocEx / WriteProcessMemory.

https://t.co/eELCUgAg80

🔗 https://www.x86matthew.com/view_post?id=clipboard_inject

🐥 [ tweet ]
😈 [ bohops, bohops ]

Sometimes, you just gotta

rundll32.exe -sta {clsid}

https://t.co/eaNSgO1sFy

🔗 https://lolbas-project.github.io/lolbas/Binaries/Rundll32/

🐥 [ tweet ]
😈 [ dr4k0nia, dr4k0nia ]

New blog post for HInvoke. It allows calling .NET runtime functions or accessing properties using only hashes as identifiers. Reducing obvious identifiers for analysts. Post also includes a little trick to avoid using PInvoke.
https://t.co/thYuk3NoQ5

🔗 https://dr4k0nia.github.io/dotnet/coding/2022/08/10/HInvoke-and-avoiding-PInvoke.html

🐥 [ tweet ]
😈 [ bohops, bohops ]

🧐

🐥 [ tweet ]
😈 [ praetorianlabs, Praetorian ]

Out of the inbox and into the fire. Modern and highly effective phishing techniques for 2022 and beyond.

https://t.co/wW2k2svkiC

#phish #redteam

🔗 https://www.praetorian.com/blog/modernized-phishing-techniques/

🐥 [ tweet ]
🔥1
😈 [ d4rckh, d4rckh ]

Introducing gorilla! The ultimate wordlist tool. It is capable of scraping websites for words, extend existing ones using advanced mutations or compute passwords using patterns! #infosec #redteam

Get it here: https://t.co/H5sa2k3wsz

🔗 https://github.com/d4rckh/gorilla

🐥 [ tweet ]
😈 [ Jean_Maes_1994, Jean ]

decided to cut the blogpost shorter so its more digestible - part 1 is up now.
Disclaimer, I am not an expert in C so if I dun goofed reach out to correct me.

https://t.co/WzZ895si1R

🔗 https://redteamer.tips/help-i-need-to-write-code-in-c-part-1-setup-and-intro/

🐥 [ tweet ]
😈 [ r4wd3r, Sebastián Castro (at Black Hat & DEFCON) ]

I had a blast releasing 'Suborner: A Windows Bribery for Invisible Persistence' at @BlackHatEvents.

Blog and GH of the attack:

Blog: https://t.co/FFZ39e4q7T
GitHub: https://t.co/TAi5zpAU2y

Thanks to all the attendees! #BHUSA #BHUSA2022 #DEFCON30 #DEFCON

🔗 https://r4wsec.com/notes/the_suborner_attack/
🔗 https://github.com/r4wd3r/Suborner

🐥 [ tweet ]
🔥1
😈 [ HuskyHacksMK, Matt | HuskyHacks ]

Good morning and happy friday! 📝New note is up on https://t.co/DIZF98hUtO

🛡 I am a Responsible Red Teamer. This is my manifesto.

https://t.co/MSXhvhIKMR

🔗 http://notes.huskyhacks.dev
🔗 https://notes.huskyhacks.dev/notes/the-responsible-red-teamers-manifesto

🐥 [ tweet ]
😈 [ kyleavery_, Kyle Avery ]

Incase you missed it, check out my new tool from #DEFCON30 !

https://t.co/tQLGr8Dvl6

🔗 https://github.com/kyleavery/AceLdr

🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]

[#HackTip ] Looking for a legitimate way of achieving #persistence on Windows? How about #AnyDesk silent deployment? 😉

🐥 [ tweet ]
🔥2
😈 [ monoxgas, Nick Landers ]

Slides are up for our (w/ @tiraniddo) Kerberos LPE presentation from #blackhat2022. Hope you enjoy, and thank for to everyone who attended!

https://t.co/uojv3cI8np

🔗 https://i.blackhat.com/USA-22/Wednesday/US-22-Forshaw-Taking-Kerberos-To-The-Next-Level.pdf

🐥 [ tweet ]
😈 [ HenriNurmi, Henri Nurmi ]

In-memory token vault BOF for #CobaltStrike. Allows you to hot swap/re-use already stolen tokens without re-duplicating, and store tokens for later use in case of a person logs out. https://t.co/34iIm5XfAw

🔗 https://github.com/Henkru/cs-token-vault

🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]

[#Tooling ⚔️] Updated my SharpBin2SelfInject gist with the recent H/Invoke technique by @dr4k0nia for a stealthier GetModuleHandle / GetProcAddress resolution and invocation 🥷🏻

https://t.co/JZd3YCXfPh

#maldev #dinvoke #hinvoke

🔗 https://gist.github.com/snovvcrash/30bd25b1a5a18d8bb7ce3bb8dc2bae37

🐥 [ tweet ]