Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ _nwodtuhs, Charlie Bromberg “Shutdown” ]

Big up to @Fransosiche and @Wlayzz for the new "HTTP Request Smuggling" page on The Hacker Recipes 🧑‍🍳

https://t.co/9k8aKrAIjz

🔗 https://www.thehacker.recipes/web/config/http-request-smuggling

🐥 [ tweet ]
😈 [ NinjaParanoid, Chetan Nayak (Brute Ratel C4 Author) ]

Here it goes. A detailed blog on proxying your DLL loads and hiding the original callstack from userland hooks/ETW with a new set of undocumented API and some hacky tricks. Code is on my Github repository. This one was a brain buster 🔥

https://t.co/AKFW8hthXZ

🔗 https://0xdarkvortex.dev/proxying-dll-loads-for-hiding-etwti-stack-tracing/

🐥 [ tweet ]
😈 [ _dirkjan, Dirk-jan ]

TIL about git add -p which allows you to choose which lines from a file to include in a commit 🤯. Super useful to pick smaller fixes and leave out large new things that are still a work in progress.

🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]

Keep in mind when scraping usernames from a #Cisco #CUCM server with @n00py1’s cucme[.]sh or @TrustedSec’s SeeYouCM-Thief: the names can be not only within the <userName> tag but also within the <firstName> and <lastName> tags. Worth checking!

https://t.co/GGX5OeKQ3Q

🔗 https://ppn.snovvcrash.rocks/pentest/infrastructure/networks/sip-voip#cisco-ip-phones

🐥 [ tweet ]
😈 [ _ZakSec, Zak ]

New Masky release (v0.2.0). Nothing crazy but you can now easily pack the agent to avoid basic EDR detections (look at the -e & -fa parameters). Some bug fixes have also been applied on the PKINIT part, thanks @mpgn_x64 !
Here is an example with the awesome NimCrypt2 loader 👌

🐥 [ tweet ]
😈 [ _Wra7h, Christian W ]

70 shellcode execution methods to pop calc and chill to

https://t.co/YdvfxlkFRJ

🔗 https://github.com/Wra7h/FlavorTown/tree/main/C

🐥 [ tweet ]
😈 [ a13xp0p0v, Alexander Popov ]

I summarized the experience with code collaboration platforms in a short article:
"Mirroring GitHub projects in 2023"
https://t.co/kit4Dlik7t

🔗 https://a13xp0p0v.github.io/2023/01/29/mirroring-github-projects.html

🐥 [ tweet ]
😈 [ NinjaParanoid, Chetan Nayak (Brute Ratel C4 Author) ]

Some EDRs catch indirect syscalls with callstack analysis. Here is a totally new technique which build a clean callstack originating from ntdll to avoid detections. No ROP required and tested and works against every EDR. Enjoy! 🔥

https://t.co/sALgfx6WQ0

🔗 https://0xdarkvortex.dev/hiding-in-plainsight/

🐥 [ tweet ]
😈 [ d3lb3_, Julien Bedel ]

(1/5) New kid in town 🔓

Following last week sudden regain of interest in KeePass trigger system abuse, I decided to prepone the release of KeePwn: an Impacket-based noscript dedicated to KeePass discovery and secret extraction for red teamers!

https://t.co/SXsy3UFY3K

🔗 https://github.com/Orange-Cyberdefense/KeePwn

🐥 [ tweet ]
🤯2
😈 [ _bin_Ash, Ash ]

Impacket's psexec drops a binary (RemCom) that is over 10 years old when creating the service it uses for command execution.

May we all aspire to write tooling that is still relevant 10 years later. RemCom = goated 🐐

Ref: https://t.co/LTNRaflIKr
RemCom: https://t.co/YrKw1nBtAt

🔗 https://github.com/fortra/impacket/blob/master/examples/psexec.py
🔗 https://github.com/kavika13/RemCom

🐥 [ tweet ]
🔥2😁1
Offensive Xwitter
BloodHound Unleashed.pdf
😈 [ n00py1, n00py ]

Slide from the CactusCon talk on all the ways to get data populated into BloodHound. Any that I missed? Which is your favorite?

🐥 [ tweet ]
🤔2
😈 [ metasploit, Metasploit Project ]

Metasploit Framework 6.3 is out now🎉

New features include native Kerberos authentication support, streamlined Active Directory attack workflows (AD CS, AD DS), and new modules that request, forge, and convert tickets between formats. https://t.co/Ucwrtmzt9W

🔗 https://www.rapid7.com/blog/post/2023/01/30/metasploit-framework-6-3-released/

🐥 [ tweet ]
😈 [ SkelSec, SkelSec ]

First version of pySnaffler is uploaded to @porchetta_ind git!
It is the python port of the well-known Snaffler tool from @mikeloss and @sh3r4_hax.
pySnaffler is compatible with the TOML classifiers of the original project. More info below

https://t.co/76Dfren3TC

🔗 https://gitlab.porchetta.industries/Skelsec/pysnaffler

🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]

I got curious about how easy it would be to bypass some of the static detections for the RemComSvc binary (which is over 10 years old) and yeah… Pretty easy 😂

https://t.co/U44Ik5RxFQ

#psexec #impacket #remcom

🔗 https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb

🐥 [ tweet ][ quote ]
Forwarded from Offensive Xwitter Eye
🔥5