😈 [ m3g9tr0n, Spiros Fraganastasis ]
PeNet is a parser for Windows Portable Executable headers. It completely written in C# and does not rely on any native Windows APIs. Furthermore it supports the creation of Import Hashes (ImpHash), which is a feature often used in malware analysis. https://t.co/MPZvqvocfO
🔗 https://github.com/secana/PeNet
🐥 [ tweet ]
PeNet is a parser for Windows Portable Executable headers. It completely written in C# and does not rely on any native Windows APIs. Furthermore it supports the creation of Import Hashes (ImpHash), which is a feature often used in malware analysis. https://t.co/MPZvqvocfO
🔗 https://github.com/secana/PeNet
🐥 [ tweet ]
😈 [ KlezVirus, d3adc0de ]
[Video] The 4th episode of my series about Inceptor is out: "Empowering Donut with Direct and Indirect Syscalls".
In this video, we'll show how it is possible to improve the donut loader by intergating it with SW3.
https://t.co/xNK4HNz9qS
🔗 https://youtu.be/ypX7N4498xE
🐥 [ tweet ]
[Video] The 4th episode of my series about Inceptor is out: "Empowering Donut with Direct and Indirect Syscalls".
In this video, we'll show how it is possible to improve the donut loader by intergating it with SW3.
https://t.co/xNK4HNz9qS
🔗 https://youtu.be/ypX7N4498xE
🐥 [ tweet ]
😈 [ ippsec, ippsec ]
Starting to play more with Elastic, so just published a video installing v8 it on Ubuntu 22. Really impressed with Fleet so far, the last time I played with Elastic it was a PITA keeping all the agent configs in sync. Fleet's auto update of agents is magic https://t.co/fbQkWgbJKW
🔗 https://www.youtube.com/watch?v=Ts-ofIVRMo4
🐥 [ tweet ]
Starting to play more with Elastic, so just published a video installing v8 it on Ubuntu 22. Really impressed with Fleet so far, the last time I played with Elastic it was a PITA keeping all the agent configs in sync. Fleet's auto update of agents is magic https://t.co/fbQkWgbJKW
🔗 https://www.youtube.com/watch?v=Ts-ofIVRMo4
🐥 [ tweet ]
😈 [ dec0ne, Mor Davidovich ]
Introducing ShadowSpray, it's like password spray but with shadow credentials. More info in the repo.
Huge thanks to @elad_shamir for the amazing technique and to @harmj0y (and others) for the implementation in Rubeus from which a lot of code was taken.
https://t.co/nIsnmaitfw
🔗 https://github.com/Dec0ne/ShadowSpray/
🐥 [ tweet ]
Introducing ShadowSpray, it's like password spray but with shadow credentials. More info in the repo.
Huge thanks to @elad_shamir for the amazing technique and to @harmj0y (and others) for the implementation in Rubeus from which a lot of code was taken.
https://t.co/nIsnmaitfw
🔗 https://github.com/Dec0ne/ShadowSpray/
🐥 [ tweet ]
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Довольно интересная статья, как обходить EDR с помощью python)))
https://www.naksyn.com/edr%20evasion/2022/09/01/operating-into-EDRs-blindspot.html
#redteam #pentest #bypass
https://www.naksyn.com/edr%20evasion/2022/09/01/operating-into-EDRs-blindspot.html
#redteam #pentest #bypass
😈 [ n00py1, n00py ]
Web vulns you should look for on an internal pentest: XXE.
We often think of XXE as a way to read local files, but you can also use it to coerce auth. HTTP NTLM does not request signing so you can easily relay it to LDAP. Web service accounts are often over permissioned.
🐥 [ tweet ]
Web vulns you should look for on an internal pentest: XXE.
We often think of XXE as a way to read local files, but you can also use it to coerce auth. HTTP NTLM does not request signing so you can easily relay it to LDAP. Web service accounts are often over permissioned.
🐥 [ tweet ]
😈 [ HackerGautam, Frooti ]
Not only crawling but you can do Subdomain Enumeration using Wayback.
⬇️
curl --insecure --silent "http://web.archive.org/cdx/search/cdx" | sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | sed "/@/d" | sed -e 's/\.$//' | sort -u
#bugbounty #hacking #infosec
🐥 [ tweet ]
Not only crawling but you can do Subdomain Enumeration using Wayback.
⬇️
curl --insecure --silent "http://web.archive.org/cdx/search/cdx" | sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | sed "/@/d" | sed -e 's/\.$//' | sort -u
#bugbounty #hacking #infosec
🐥 [ tweet ]
😈 [ ORCx41, ORCA ]
decided to release this, a highly capable pe packer, with a lot of nice features
https://t.co/iedhKbTlzm
🔗 https://github.com/ORCx41/AtomPePacker
🐥 [ tweet ]
decided to release this, a highly capable pe packer, with a lot of nice features
https://t.co/iedhKbTlzm
🔗 https://github.com/ORCx41/AtomPePacker
🐥 [ tweet ]
😈 [ g0h4n_0, g0h4n ]
Today I share with you #RustHound🦀. A new AD collector written in #Rust for #BloodHound!
It is cross-platform, cross-compiled and generates all json files needed.
Other modules will be available as under development!🔥
Hope you will enjoy it!
https://t.co/bxjCVyocfv https://t.co/8jEcSuEdEj
🔗 https://github.com/OPENCYBER-FR/RustHound
🐥 [ tweet ][ quote ]
Today I share with you #RustHound🦀. A new AD collector written in #Rust for #BloodHound!
It is cross-platform, cross-compiled and generates all json files needed.
Other modules will be available as under development!🔥
Hope you will enjoy it!
https://t.co/bxjCVyocfv https://t.co/8jEcSuEdEj
🔗 https://github.com/OPENCYBER-FR/RustHound
🐥 [ tweet ][ quote ]
😈 [ pdiscoveryio, ProjectDiscovery.io ]
The Ultimate Guide to Finding Bugs With Nuclei by @v3natoris
https://t.co/2GY3QZlTft
#hackwithautomation #cybersecurity #infosec #bugbounty
🔗 https://blog.projectdiscovery.io/ultimate-nuclei-guide/
🐥 [ tweet ]
The Ultimate Guide to Finding Bugs With Nuclei by @v3natoris
https://t.co/2GY3QZlTft
#hackwithautomation #cybersecurity #infosec #bugbounty
🔗 https://blog.projectdiscovery.io/ultimate-nuclei-guide/
🐥 [ tweet ]
😈 [ FortaliceLLC, Fortalice Solutions ]
NTLM Relaying to SCCM for the win 👀👀👀 Fortalice's @Tw1sm just added SCCM support to NtlmRelayX. Check out the PR at: https://t.co/hWfNeiuqxp
🔗 https://github.com/SecureAuthCorp/impacket/pull/1425
🐥 [ tweet ]
NTLM Relaying to SCCM for the win 👀👀👀 Fortalice's @Tw1sm just added SCCM support to NtlmRelayX. Check out the PR at: https://t.co/hWfNeiuqxp
🔗 https://github.com/SecureAuthCorp/impacket/pull/1425
🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]
Based on @dec0ne’s work on ShadowSpray I’ve pushed a small update to #pywhisker of @_nwodtuhs and @podalirius_ implementing the ‘spray’ action. Now you can pass a list of users and try to add the same Shadow Credentials for each of them with pywhisker from Linux 👌🏻
🐥 [ tweet ]
Based on @dec0ne’s work on ShadowSpray I’ve pushed a small update to #pywhisker of @_nwodtuhs and @podalirius_ implementing the ‘spray’ action. Now you can pass a list of users and try to add the same Shadow Credentials for each of them with pywhisker from Linux 👌🏻
🐥 [ tweet ]
🔥1