Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
Генератор тестилки шеллкодов, как shcode2exe, только на баше 👇🏻
#!/usr/bin/env bash

# Usage:
# bin2compile.sh {32|64} <INPUT_BIN> [OUTPUT_EXE]
# Examples:
# msfvenom -p windows/x64/exec CMD=calc.exe -f raw -o calc.bin
# bin2compile.sh 64 calc.bin calc.exe

ARCH="${1}"
SC_PATH=`realpath "${2}"`
SC_NAME=`basename "${SC_PATH}"`
SC_NAME="${SC_NAME%.*}"
[[ "${#}" -gt 2 ]] && EXE_NAME="${3}" || EXE_NAME="${SC_NAME}.exe"

cat << EOT > "/tmp/${SC_NAME}.asm"
global _start
section .text
_start:
incbin "${SC_PATH}"
EOT

if [[ "${ARCH}" == "32" ]]; then
NASM_ARCH="win32"
LD_ARCH="i386pe"
elif [[ "${ARCH}" == "64" ]]; then
NASM_ARCH="win64"
LD_ARCH="i386pep"
fi

echo "[*] Compile time: `date`"
echo "[*] Compiling x${ARCH}"

nasm -f "${NASM_ARCH}" -o "/tmp/${SC_NAME}.obj" "/tmp/${SC_NAME}.asm"
ld -m "${LD_ARCH}" -o "${EXE_NAME}" "/tmp/${SC_NAME}.obj"

if [[ "$?" -ne 1 ]]; then
echo "[+] Success"
echo "[+] Output size: `stat -c %s ${EXE_NAME} | numfmt --to=iec`"
else
echo "[-] Failed"
fi

rm -f /tmp/${SC_NAME}.{asm,obj}
🔥9👍3
😈 [ ATTL4S @DaniLJ94 ]

New post together with @saim1z exploring Cobalt Strike's make_token command.

We realised there is not a lot of information about this functionality, so we decided to take a good look at it to answer some questions we had and how it works under the hood.

Enjoy!

🔗 https://research.nccgroup.com/2023/11/10/demystifying-cobalt-strikes-make_token-command/

🐥 [ tweet ]
👍6😁3
😈 [ Florian Roth @cyb3rops ]

I'm still collecting funny issues on offsec tools on Github

If you find more, send them my way and I'll create a Github repo so we can collect them together for the lulz

🔗 https://neo23x0.github.io/LOLSecIssues/

🐥 [ tweet ]
😁8
😈 [ assume_breach @assume_breach ]

Getting a beacon from the DC using a raw Havoc shellcode file from a network shared folder. Tool is in my repo.

🔗 https://github.com/assume-breach/Home-Grown-Red-Team.git

🐥 [ tweet ]
👍5
This media is not supported in your browser
VIEW IN TELEGRAM
🔥8👍3
😈 [ Panagiotis Chartas @t3l3machus ]

For your #redteam enumeration and brute forcing needs, use babelstrike to transliterate and generate usernames from full names in various non-English languages (common issue from scraped employee data) 🌐 Currently, it covers Greek, Hindi, Spanish, French, Polish, and Hungarian:

🔗 https://github.com/t3l3machus/BabelStrike

Combine it with #psudohash, a password list generator that imitates password creation patterns commonly used by humans, like substituting a word's letters with symbols or numbers (leet), using char-case variations, adding a common padding before or after the main passphrase and more:

🔗 https://github.com/t3l3machus/psudohash

🐥 [ tweet ]
😈 [ SkelSec @SkelSec ]

Due to a gentle nudge from @michael_eder_ I have uploaded my pysnaffler project to Github and to pyp.
(did you know that you can sponsor me on github?)
Anyways, enjoy!

🔗 https://github.com/skelsec/pysnaffler

🐥 [ tweet ]
😈 [ Diego Capriotti @naksyn ]

Here's Process Stomping injection and how you can use it in a Mockingjay-ish way to load a Beacon on a exe's RWX section using sRDI. Check it out!

Blog:
🔗 https://www.naksyn.com/edr%20evasion/2023/11/18/mockingjay-revisited-process-stomping-srdi-beacon.html

Tool:
🔗 https://github.com/naksyn/ProcessStomping

Thanks to @hasherezade and @monoxgas for their awesome work

🐥 [ tweet ]
🔥3
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Arris Huijgen @bitsadmin ]

#LOFLCAB highlight: Ssms.exe

Using SQL Server Management Studio with Kerberos authentication to obtain command execution on the SQL server using the xp_cmdshell stored procedure.

Details:
🔗 https://lofl-project.github.io/loflcab/Binaries/Ssms/

Full quality video:
🔗 https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-3#sql-server

🐥 [ tweet ][ quote ]
🔥3
😈 [ Adam Svoboda @adamsvoboda ]

Ever find yourself on an endpoint with SentinelOne and have Local Admin? Just ask SentinelAgent.exe nicely, and it will dump a process for you, including itself!

It bombs out on LSASS, but most other processes work.

🔗 https://gist.github.com/adamsvoboda/8e248c6b7fb812af5d04daba141c867e

Unable to dump LSASS using the previous noscript? No problem, just ask S1 for a Live Kernel Dump instead! You can open this in windbg (and use mimilib.dll) and go from there.

🔗 https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80

🐥 [ tweet ][ quote ]
😁4
😈 [ HackerRalf @hacker_ralf ]

Everyone takes a lot from the community... it's time to give something back yourself.

Kerbeus - BOF implementation of Rubeus (not all).

🔗 https://github.com/RalfHacker/Kerbeus-BOF

P. S. PM me about all bugs

#redteam #kerberos #havoc #cobaltstrike #bof

🐥 [ tweet ]
👍10
😈 [ hermit @ackmage ]

hi, check out this tool for easy Linux kernel building and debugging - easylkb

worked on it together with @netspooky! 💕

writeup:
🔗 http://tmpout.sh/3/20.html

repo:
🔗 http://github.com/deepseagirl/easylkb

🐥 [ tweet ]
👍4
😈 [ Synacktiv @Synacktiv ]

Unlock the Global Admin access 🏆 on Azure with this pentesting mindmap made by @alexisdanizan!

🔗 https://github.com/synacktiv/Mindmaps

🐥 [ tweet ]
🔥1