Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ _zblurx, Thomas Seigneuret ]

New technique to dump NTDS remotely WITHOUT DSRUAPI: https://t.co/pMY2mwtB8N (Golden Certificates + UnPAC the hash automation)
Thanks @ly4k_ for certipy, which my noscript heavily relies on.

🔗 https://github.com/zblurx/certsync

🐥 [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg “Shutdown” ]

New merges for ThePorgs/impacket 🤘 fork is now 264 commits ahead of master

🐥 [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg “Shutdown” ]

I nominated @_dirkjan @exploitph and @SkelSec for their awesome contributions and guidance in the past months and years. I wished I could nominate other awesome contributors like @snovvcrash @ly4k_ @mpgn_x64 @_wald0 @podalirius_ @elad_shamir and more, but I was limited to 3

🐥 [ tweet ]

когда тебя тегают в одном твите с топовыми ресерчерами, просыпается синдром самозванца 😅
🔥3😁2
😈 [ Octoberfest73, Octoberfest7 ]

I came accross @the_bit_diddler 's github and he has an impressive collection of CobaltStrike BOF's that are worth checking out. I've already found a few functions within some of their projects I can envision a use for in mine. https://t.co/bLijq0fNDv

🔗 https://github.com/EspressoCake

🐥 [ tweet ]
Псс, гайс, слышали об уязвимости CVE-2022-48109? Вот и я нет до сегодняшнего дня, а ведь это CVE ID моего инфосек-братишки @Acrono! Хочу первым поздравить Пашу с потерей цвйешной девственности – ура-ура! Ждем от него покорения новых вершин на поприще киберсесурити 💪🏻

Следите за каналом @APT_Notes, чтобы узнать подробности 😉
🔥10
😈 [ D1rkMtr, D1rkMtr ]

Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table

https://t.co/xRLFL7cUZR

🔗 https://github.com/TheD1rkMtr/NTDLLReflection

🐥 [ tweet ]
😈 [ irsdl, Soroush Dalili 🗹 ]

Burp Suite #Sharpener v3.0 is out in the GitHub repo: https://t.co/jB9KLTlora

Some bugs have been fixed and icons sizes are now bearable!

This is only compatible with Burp v2023.1 (early adaptor currently) as it is based on the new Montoya API v1.0.

🔗 https://github.com/mdsecresearch/BurpSuiteSharpener/tree/main/release

🐥 [ tweet ]

ИКОНКИ ДЛЯ БУРПА ЛЮДИ ПОЧЕМУ У МЕНЯ ЭТО ЕЩЕ НЕ УСТАНОВЛЕНО
😈 [ nikhil_mitt, Nikhil Mittal ]

[Blog] My non-tech post on "Our vision for Red Team Labs, Platform and Certifications (CRTP, CRTE, CARTP and more)"
#AlteredSecurity

https://t.co/D4fFL6RcwG

🔗 https://www.alteredsecurity.com/post/redlabs

🐥 [ tweet ]
IMG_5582.PNG
3.4 MB
😈 [ last0x00, last - @last0x00@infosec.exchange ]

I was today years old when I found out there is a #CrackMapExec reference in graphical PNG format with a resolution of more than 7000x10000 hosted here👇

https://t.co/Q7HgNqDK9Q

🔗 https://raw.githubusercontent.com/Ignitetechnologies/Mindmap/main/Crackmapexec/Crackmapexec%20HD.png

🐥 [ tweet ]
🤯2🔥1
IMG_5583.PNG
2 MB
😈 [ Jenaye_fr, Jenaye ]

Hello everyone ! 👋

I would like to share with you a mindmap (v1) about bypassing AV/EDR.

In Redteam setup, I suggest the manual mode only.

Thanks to @Zabannn for his contribution

Link : https://t.co/2eOWcBMXzc

#BypassAV #BypassEDR #RT

🔗 https://github.com/CMEPW/BypassAV

🐥 [ tweet ]
🔥2
😈 [ 0x0SojalSec, Md Ismail Šojal ]

Nuclei Automation.⚔️

https://t.co/CDes83cCD0

Full Nuclei automation noscript with logic explanation

#bugbountytips #infosec #nuclei #automation

🔗 https://github.com/iamthefrogy/nerdbug

🐥 [ tweet ]
🔥1😁1
👹 [ snovvcrash, sn🥶vvcr💥sh ]

[#HackTip ⚒️] One idea for NTDS on-site dumping without VSS: NTFSCopy (thx @RedCursorSec) + #impacket’s RemoteOperations.getBootKey() + secretsdump[.]py (e.g., via a pre-compiled binary or @naksyn’s awesome Pyramid) 🤪

https://t.co/0UATJuJ1ob

🔗 https://ppn.snovvcrash.rocks/pentest/infrastructure/ad/credentials-dump/ntds#raw-ntds.dit-copy

🐥 [ tweet ][ quote ]
😈 [ filip_dragovic, Filip Dragovic ]

Another way to abuse SeImpersonate privilege.
This time using RasMan service.
https://t.co/FmWTBrKkCy

🔗 https://github.com/crisprss/RasmanPotato

🐥 [ tweet ]
🥱1
😈 [ pdiscoveryio, ProjectDiscovery.io ]

Learn all about SSL and TLS certificates in our hacker's guide! Get up to speed with TLSx from ProjectDiscovery, the fast & configurable tool for finding vulnerabilities & reconnaissance. #hackwithautomation #cybersecuritytips

https://t.co/uKhaSB90Nq

🔗 https://blog.projectdiscovery.io/a-hackers-guide-to-ssl-certificates-featuring-tlsx/

🐥 [ tweet ]
😈 [ garrfoster, Garrett ]

New blog post building on @Oddvarmoe 's original research with pre-created computer accounts. I share how sysadmins are inadvertently creating them and how they can be used to circumvent domain join restrictions.

https://t.co/tezVz1caxU

🔗 https://www.optiv.com/insights/source-zero/blog/diving-deeper-pre-created-computer-accounts

🐥 [ tweet ]