Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ vxunderground, vx-underground ]

Amazon recommended Russian ransomware operator essentials

🐥 [ tweet ]
😁11🔥1
😈 [ garrfoster, Garrett ]

Sharing a tool I wrote to streamline attacking SCCM. Some features include profiling target servers for admin smb relay attacks, site server takeover, http enrollment, and leveraging the adminservice api.

https://t.co/aiJzWIJNDR

🔗 https://github.com/garrettfoster13/sccmhunter

🐥 [ tweet ]
🔥3
😈 [ PenTestPartners, Pen Test Partners ]

Our @_EthicalChaos_ found a vuln in Kape's CyberGhost VPN affecting ~3m users & reported it to them. It didn't go well. VDPs cannot be exclusively outsourced to bug bounty platforms. Bullied by Bugcrowd: https://t.co/xT4wJXMqMh

🔗 https://www.pentestpartners.com/security-blog/bullied-by-bugcrowd-over-kape-cyberghost-disclosure/

🐥 [ tweet ]
🤔1
😈 [ deadvolvo, I am d3d (dead, мёртв, 死了) ]

@NinjaParanoid They can literally change out Cobalt Strike for BRc4 in my paper, which should add a few more layers of obfuscation from direct detection methods.

https://t.co/8eilbLSKfO

🔗 https://blog.malicious.group/automating-c2-infrastructure-with-terraform-nebula-caddy-and-cobalt-strike/

🐥 [ tweet ]
🤯4
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ its_a_feature_, Cody Thomas ]

It's official! Mythic 3.0 is LIVE! Check out the blog post about it here: https://t.co/LJb77jLqQZ. Highlights include: rpfwds, graph groupings, jupyter notebook, custom webhooks, tags, docker updates, and an entirely new back end!

🔗 https://posts.specterops.io/c2-and-the-docker-dance-mythic-3-0s-marvelous-microservice-moves-f6e6e91356e2

🐥 [ tweet ]
🤯1
😈 [ _RastaMouse, Rasta Mouse ]

I wrote a little BOF that enumerates the protection level of a PP/PPL process.

https://t.co/98PxBX56OF

🔗 https://github.com/rasta-mouse/PPEnum

🐥 [ tweet ]
🤯2
😈 [ rootsecdev, rootsecdev ]

“Writing a Sliver C2 Powershell Stager with Shellcode Compression and AES Encryption” by Ycf-Kel
https://t.co/pFI88KOvIX

🔗 https://link.medium.com/MluhuP9NKzb

🐥 [ tweet ]
🔥4
😈 [ freefirex2, freefirex ]

Converting PPLFault (original: https://t.co/SjSmi2MYJa) has been one of the more difficult BOF converts, but was still pretty fun to tackle :)

🔗 https://github.com/gabriellandau/PPLFault

🐥 [ tweet ]

к теме про https://news.1rj.ru/str/RalfHackerChannel/1330
🔥3
😈 [ Flangvik, Melvin langvik ]

In yesterday's stream, I began integrating @0xcc00 excellent project yetAnotherObfuscator with the SharpCollection Pipeline. Resulting in a new repo, https://t.co/RmVum0w6yt Usefull for CTF's or basic evasion!

🔗 https://github.com/Flangvik/ObfuscatedSharpCollection

🐥 [ tweet ]
😈 [ _wald0, Andy Robbins ]

My latest blog post: how to turn Domain Admin in a child domain into Enterprise Admin with ADCS ESC5: https://t.co/If8Ek3bRkZ

🔗 https://posts.specterops.io/from-da-to-ea-with-esc5-f9f045aa105c

🐥 [ tweet ]
🔥3
😈 [ HackingLZ, Justin Elze ]

Wrote a new blog about building a host based recon methodology and the importance of recon on compromised hosts.

https://t.co/Ra1quelbG2 https://t.co/Ug46ncWHyM

🔗 https://www.trustedsec.com/blog/walking-the-tightrope-maximizing-information-gathering-while-avoiding-detection-for-red-teams/

🐥 [ tweet ]
🔥1
😈 [ ShitSecure, S3cur3Th1sSh1t ]

My team mate @m_fielenbach recently created a python noscript to automate the process of discovering and exploiting ESC1 & ESC8 ADCS vulnerabilities: 🙌

https://t.co/YRxh1Np6Ni

So if you want to save some minutes of time in your next projects feel free to test it out. 🔥

🔗 https://github.com/grimlockx/ADCSKiller

🐥 [ tweet ]
🔥2🥱1
😈 [ Agarri_FR, Nicolas Grégoire ]

Here’s the slides of the talk I gave yesterday at NorthSec 2023

"Tips and tricks for Burp Suite Pro, ten years later" #nsec23 @NorthSec_io

https://t.co/QUjLUPBV7j

🔗 https://www.agarri.fr/docs/nsec23-burp_tips_n_tricks.pdf

🐥 [ tweet ]
🔥1
👹 [ snovvcrash, sn🥶vvcr💥sh ]

It’s always a pleasure to see that the community is trying to make KeePass more secure, but there’re still so many ways to extract the masterkey and/or dump the DB. Not including the methods on the screenshot, KeePass Plugin Cache Poisoning is also pretty slick:

🔗 https://blog.quarkslab.com/post-exploitation-abusing-the-keepass-plugin-cache.html
🔗 https://github.com/d3lb3/KeeFarceReborn#make-keepass-inject-keefarce-reborn-as-a-plugin
🔗 https://ppn.snovvcrash.rocks/pentest/infrastructure/ad/credential-harvesting/keepass#abusing-the-keepass-plugin-cache

🐥 [ tweet ][ quote ]
🔥9🤔1
Forwarded from ][ inside (Андрей Письменный)
Если кто-то из ваших знакомых вдруг пожелает купить подписку на «Хакер», можете смело выдавать промо-код Phd2023-xakep, он работает до 1 июля и дает цену годовой подписки 3000 вместо 4000 рублей. Если есть желание, его можно смело распространять в соцсетях и групповых чатах. Страница быстрой оплаты: https://xakep.ru/paywall/form/
🔥3🥱2
😈 [ mrd0x, mr.d0x ]

Didn't have time to talk about the newly released TLDs last week, but here we go.

File Archiver In The Browser: Emulating file archive software in the browser with a .zip domain for phishing

https://t.co/yvT6lT0UnU

🔗 https://mrd0x.com/file-archiver-in-the-browser/

🐥 [ tweet ]
🤯1🥱1
😈 [ s4ntiago_p, S4ntiagoP ]

Added support for the clang compiler to nanodump.
For those doing compile time obfuscation 🙂

🔗 https://github.com/fortra/nanodump/commit/c211c5f72b2438afb09d0eb917fe32150be91344

🐥 [ tweet ]

завезли возможность обфускации нанодампа OLLVM-ом, ну а я напомню, что хороший гайд по установки clang в Кали есть в репозитории Shhhloader 😉
🔥3