👹 [ snovvcrash, sn🥶vvcr💥sh ]
I got curious about how easy it would be to bypass some of the static detections for the RemComSvc binary (which is over 10 years old) and yeah… Pretty easy 😂
https://t.co/U44Ik5RxFQ
#psexec #impacket #remcom
🔗 https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb
🐥 [ tweet ][ quote ]
I got curious about how easy it would be to bypass some of the static detections for the RemComSvc binary (which is over 10 years old) and yeah… Pretty easy 😂
https://t.co/U44Ik5RxFQ
#psexec #impacket #remcom
🔗 https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb
🐥 [ tweet ][ quote ]
😈 [ bohops, bohops ]
[DynamicDotNet Tooling] Added a POC "Dynamic Assembly Loader" to the repo that loads and executes an assembly using a dynamic method and emitted MSIL instructions (C#).
System.Reflection.Emit is quite powerful (maybe more to come in a future blog post)
https://t.co/i801jA3gGh
🔗 https://github.com/bohops/DynamicDotNet/blob/main/assembly_loader/DynamicAssemblyLoader.cs
🐥 [ tweet ]
[DynamicDotNet Tooling] Added a POC "Dynamic Assembly Loader" to the repo that loads and executes an assembly using a dynamic method and emitted MSIL instructions (C#).
System.Reflection.Emit is quite powerful (maybe more to come in a future blog post)
https://t.co/i801jA3gGh
🔗 https://github.com/bohops/DynamicDotNet/blob/main/assembly_loader/DynamicAssemblyLoader.cs
🐥 [ tweet ]
😈 [ zux0x3a, Lawrence 勞倫斯 | لورانس ]
https://t.co/Oa8giJvjNq Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.
🔗 https://github.com/OmriBaso/RToolZ
🐥 [ tweet ]
https://t.co/Oa8giJvjNq Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.
🔗 https://github.com/OmriBaso/RToolZ
🐥 [ tweet ]
😈 [ n00py1, n00py ]
Exploiting Resource Based Constrained Delegation (RBCD) with Pure Metasploit
https://t.co/IWuIKiiMzF
🔗 https://www.n00py.io/2023/01/exploiting-resource-based-constrained-delegation-rbcd-with-pure-metasploit/
🐥 [ tweet ]
Exploiting Resource Based Constrained Delegation (RBCD) with Pure Metasploit
https://t.co/IWuIKiiMzF
🔗 https://www.n00py.io/2023/01/exploiting-resource-based-constrained-delegation-rbcd-with-pure-metasploit/
🐥 [ tweet ]
😈 [ 0x0SojalSec, Md Ismail Šojal ]
The shortest payload for a tiny php reverse shell written in 19 bytes using only non-alphanumeric characters. Hex values inside ⛶ indicate raw bytes.
This will help to bypass WAF and execute PHP reverse shell for RCE.
get more detail about this👇
🔗 https://gist.github.com/0xSojalSec/5bee09c7035985ddc13fddb16f191075
#bugbountyTips #bugbounty
🐥 [ tweet ]
The shortest payload for a tiny php reverse shell written in 19 bytes using only non-alphanumeric characters. Hex values inside ⛶ indicate raw bytes.
This will help to bypass WAF and execute PHP reverse shell for RCE.
get more detail about this👇
🔗 https://gist.github.com/0xSojalSec/5bee09c7035985ddc13fddb16f191075
#bugbountyTips #bugbounty
🐥 [ tweet ]
Forwarded from APT
⭐️ Privileger
Privilger allows you to work with privileges in Windows as easily as possible. There are three modes:
— Add privileges to an account;
— Start a process by adding a specific privilege to its token;
— Remove privilege from the user.
Thanks to:
@Michaelzhm
https://github.com/MzHmO/Privileger
#ad #windows #privilege #lsa
Privilger allows you to work with privileges in Windows as easily as possible. There are three modes:
— Add privileges to an account;
— Start a process by adding a specific privilege to its token;
— Remove privilege from the user.
Thanks to:
@Michaelzhm
https://github.com/MzHmO/Privileger
#ad #windows #privilege #lsa
🔥2
😈 [ 0xdf_, 0xdf ]
There's a new(ish) technique for exploiting PHP LFI to get RCE without uploading a webshell. I showed it in Beyond Root on UpDown, but wanted to go into more detail. We'll look at LFI2RCE and how it uses PHP filters to generate executed PHP from nothing.
https://t.co/dp3YYcPxks
🔗 https://www.youtube.com/watch?v=TnLELBtmZ24
🐥 [ tweet ]
There's a new(ish) technique for exploiting PHP LFI to get RCE without uploading a webshell. I showed it in Beyond Root on UpDown, but wanted to go into more detail. We'll look at LFI2RCE and how it uses PHP filters to generate executed PHP from nothing.
https://t.co/dp3YYcPxks
🔗 https://www.youtube.com/watch?v=TnLELBtmZ24
🐥 [ tweet ]
😈 [ _zblurx, Thomas Seigneuret ]
New technique to dump NTDS remotely WITHOUT DSRUAPI: https://t.co/pMY2mwtB8N (Golden Certificates + UnPAC the hash automation)
Thanks @ly4k_ for certipy, which my noscript heavily relies on.
🔗 https://github.com/zblurx/certsync
🐥 [ tweet ]
New technique to dump NTDS remotely WITHOUT DSRUAPI: https://t.co/pMY2mwtB8N (Golden Certificates + UnPAC the hash automation)
Thanks @ly4k_ for certipy, which my noscript heavily relies on.
🔗 https://github.com/zblurx/certsync
🐥 [ tweet ]
😈 [ JoelGMSec, Joel GM ]
Nueva herramienta (con la colaboración de @3v4Si0N) y entrada en el #blog!😋
Transfiriendo ficheros en entornos restringidos con #InvokeTransfer
https://t.co/rJYxbvdOgm
https://t.co/0ZEgI0TTK2
#Darkbyte #Hacking #PowerShell #Clipboard #DataTransfer
🔗 https://darkbyte.net/transfiriendo-ficheros-en-entornos-restringidos-con-invoke-transfer
🔗 https://github.com/JoelGMSec/Invoke-Transfer
🐥 [ tweet ]
Nueva herramienta (con la colaboración de @3v4Si0N) y entrada en el #blog!😋
Transfiriendo ficheros en entornos restringidos con #InvokeTransfer
https://t.co/rJYxbvdOgm
https://t.co/0ZEgI0TTK2
#Darkbyte #Hacking #PowerShell #Clipboard #DataTransfer
🔗 https://darkbyte.net/transfiriendo-ficheros-en-entornos-restringidos-con-invoke-transfer
🔗 https://github.com/JoelGMSec/Invoke-Transfer
🐥 [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg “Shutdown” ]
✅ I nominated @_dirkjan @exploitph and @SkelSec for their awesome contributions and guidance in the past months and years. I wished I could nominate other awesome contributors like @snovvcrash @ly4k_ @mpgn_x64 @_wald0 @podalirius_ @elad_shamir and more, but I was limited to 3
🐥 [ tweet ]
✅ I nominated @_dirkjan @exploitph and @SkelSec for their awesome contributions and guidance in the past months and years. I wished I could nominate other awesome contributors like @snovvcrash @ly4k_ @mpgn_x64 @_wald0 @podalirius_ @elad_shamir and more, but I was limited to 3
🐥 [ tweet ]
когда тебя тегают в одном твите с топовыми ресерчерами, просыпается синдром самозванца 😅🔥3😁2
😈 [ Octoberfest73, Octoberfest7 ]
I came accross @the_bit_diddler 's github and he has an impressive collection of CobaltStrike BOF's that are worth checking out. I've already found a few functions within some of their projects I can envision a use for in mine. https://t.co/bLijq0fNDv
🔗 https://github.com/EspressoCake
🐥 [ tweet ]
I came accross @the_bit_diddler 's github and he has an impressive collection of CobaltStrike BOF's that are worth checking out. I've already found a few functions within some of their projects I can envision a use for in mine. https://t.co/bLijq0fNDv
🔗 https://github.com/EspressoCake
🐥 [ tweet ]
Псс, гайс, слышали об уязвимости CVE-2022-48109? Вот и я нет до сегодняшнего дня, а ведь это CVE ID моего инфосек-братишки @Acrono! Хочу первым поздравить Пашу с потерей цвйешной девственности – ура-ура! Ждем от него покорения новых вершин на поприще киберсесурити 💪🏻
Следите за каналом @APT_Notes, чтобы узнать подробности 😉
Следите за каналом @APT_Notes, чтобы узнать подробности 😉
🔥10
😈 [ D1rkMtr, D1rkMtr ]
Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table
https://t.co/xRLFL7cUZR
🔗 https://github.com/TheD1rkMtr/NTDLLReflection
🐥 [ tweet ]
Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table
https://t.co/xRLFL7cUZR
🔗 https://github.com/TheD1rkMtr/NTDLLReflection
🐥 [ tweet ]
😈 [ irsdl, Soroush Dalili 🗹 ]
Burp Suite #Sharpener v3.0 is out in the GitHub repo: https://t.co/jB9KLTlora
Some bugs have been fixed and icons sizes are now bearable!
This is only compatible with Burp v2023.1 (early adaptor currently) as it is based on the new Montoya API v1.0.
🔗 https://github.com/mdsecresearch/BurpSuiteSharpener/tree/main/release
🐥 [ tweet ]
Burp Suite #Sharpener v3.0 is out in the GitHub repo: https://t.co/jB9KLTlora
Some bugs have been fixed and icons sizes are now bearable!
This is only compatible with Burp v2023.1 (early adaptor currently) as it is based on the new Montoya API v1.0.
🔗 https://github.com/mdsecresearch/BurpSuiteSharpener/tree/main/release
🐥 [ tweet ]
ИКОНКИ ДЛЯ БУРПА ЛЮДИ ПОЧЕМУ У МЕНЯ ЭТО ЕЩЕ НЕ УСТАНОВЛЕНО