Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
👹 [ snovvcrash, sn🥶vvcr💥sh ]

Making @ShitSecure’s dream of in-memory #LaZagne come true here 😅 Kudos to @naksyn and his awesome #Pyramid project 🔥🐍

P. S. Also fixed #KeeThief execution within LaZagne for Python 3

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ splinter_code, Antonio Cocomazzi ]

#JuicyPotato is back! 🔥

Get instant SYSTEM access if you have SeImpersonate or SeAssignPrimaryToken privs!

Checkout our new #JuicyPotatoNG 👇

https://t.co/mqB9dZ3YCA

cc @decoder_it

🔗 https://decoder.cloud/2022/09/21/giving-juicypotato-a-second-chance-juicypotatong

🐥 [ tweet ]
😈 [ mpgn_x64, mpgn ]

CrackMapExec can now export share results in case you are scanning a /24 or /16 🔥

Thanks to @gray_sec for the PR 🚀

🐥 [ tweet ][ quote ]
😈 [ ORCx41, ORCA ]

ever wanted to replace FindResource, LoadResource, LockResource, SizeofResource...
well, now you can :
https://t.co/Xl9F56pd4p

🔗 https://github.com/ORCx41/ManualRsrcDataFetching

🐥 [ tweet ]
😈 [ mpgn_x64, mpgn ]

Full scenario with CrackMapExec 🚀

1⃣ get all IP from your domain (using DA)
2⃣ scan all shares with the account of your choice
3⃣ export the results
4⃣ analyse the results
5⃣ call the CISO immediately 😂

🐥 [ tweet ][ quote ]
🔥1
😈 [ mariuszbit, mgeeky | Mariusz Banach ]

🦠If you wish to understand what's causing your AMSI detection - whether VBA or WSH, you might check out Matt Graeber's @mattifestation AMSITools.ps1.

I crafted up HOWTO and a helper noscript that uses his brilliant work to pull AMSI events:

https://t.co/gOjTGuXUSZ

🔗 https://github.com/mgeeky/Penetration-Testing-Tools/tree/master/red-teaming/AMSITools

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
Не могу не порекомендовать подписываться на @s0i37_channel, так как уже предчувствую годноту от @s0i37. К сожалению, мы не знакомы лично, но его работы восхищают.

Мое любимое – это:
- https://xakep.ru/2020/06/17/windows-mitm/
- https://github.com/s0i37/lateral
🔥4😁2
😈 [ Six2dez1, Six2dez ]

This is a superb article for pentesting Cisco networks

https://t.co/spiVfvLyQm

🔗 https://medium.com/@in9uz/cisco-nightmare-pentesting-cisco-networks-like-a-devil-f4032eb437b9

🐥 [ tweet ]
🔥3
😈 [ NationalCyberS1, National Cyber Security Services ]

LinWinPwn:- A bash noscript that automates a number of Active Directory Enumeration and Vulnerability checks.

Link:https://t.co/pR8suEn8PZ

#hacking #bugbountytips #informationsecurity #cybersecurity #infosec #cybersecuritytips #Ethicalhacking #Pentesting

https://t.co/uJj502OabP

🔗 https://github.com/lefayjey/linWinPwn
🔗 https://ncybersecurity.com

🐥 [ tweet ]
😈 [ HackerOtter, OtterHacker ]

Muscle up your game with Kerberos. Abuse tickets and Kerberos extensions to elevate your privileges.

I've built a small lab around the S4U2Self Abuse :
https://t.co/8GSnJuLJcf

Find all you need here :
https://t.co/hXkRocpkSX

Thanks @pentest_swissky for the help on ansible !

🔗 https://github.com/OtterHacker/LabS4U2Self
🔗 https://otterhacker.github.io/Pentest/Services/Kerberos.html

🐥 [ tweet ]
😈 [ redteamfieldman, RTFM ]

Doing some end of the week research on command and control platforms and ran across a couple great resources. @c2_matrix #C2 #RedTeam
https://t.co/3VPtAFW9sK
https://t.co/SV1nZkJuD7

🔗 https://www.thec2matrix.com/matrix
🔗 https://github.com/tcostam/awesome-command-control

🐥 [ tweet ]
😈 [ an0n_r0, an0n ]

EVERYTHING about relaying attacks by @vendetce. Just scrolled through the slides (here: https://t.co/c4187R98AQ), still watching the video, awesome content. Thanks for this broad comprehensive presentation! 👍👍👍 https://t.co/MMIgE6xboY

🔗 https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Coercions-and-Relays-The-First-Cred-is-the-Deepest.pdf
🔗 https://youtu.be/b0lLxLJKaRs

🐥 [ tweet ][ quote ]
😈 [ _nwodtuhs, Charlie “Shutdown” ]

The Hacker Recipes presents GoldenGMSA 🪙

Shoutout to @Dramelac_ for preparing the recipe and @volker_carstein for initial review and changes.
Shoutout to the awesome work by @SemperisTech and @YuG0rd for the research and tooling

https://t.co/SzTykUrPJw

🔗 https://www.thehacker.recipes/ad/persistence/goldengmsa

🐥 [ tweet ]
😈 [ lkarlslund, Lars Karlslund ]

Cool LDAP utility for Red Teamers! Easy to do simple lookups and some modifications - it has great potential and I'm sure more features will come. I had a similar tool planned, but never found the time to do it - fortunately @synzack21 did!
https://t.co/LhOsVPTbV8

🔗 https://github.com/Synzack/ldapper

🐥 [ tweet ]
😈 [ themarcba, Marc Backes ]

Add these aliases to your terminal. Thank me later.

🐥 [ tweet ]

а чо так можно было?!