Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ XMander @checkymander ]

Setting up Nemesis can be daunting, I wrote a blog post detailing the exact steps you need to to go from a fresh Ubuntu 22.04 image to a running Nemesis setup.

Future posts, I'd like to go into operational usage of it with Mythic and other tools

🔗 https://blog.checkymander.com/red%20team/tools/operations/Nemesis-Zero-To-Hero/

🐥 [ tweet ]
Forwarded from Zer0Day Lab
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Zer0Day Lab
Please open Telegram to view this post
VIEW IN TELEGRAM
😈 [ Matt Eidelberg @Tyl0us ]

Long overdue but SourcePoint v3.0 is out now, with a ton of new features and bug fixes. With these changes, Initial access and Post-Ex activities with CobaltStrike can fly under the radar.
Check it out !
#redteam #netsec

🔗 https://github.com/Tylous/SourcePoint/releases/tag/v3.0

🐥 [ tweet ]
🔥5
😈 [ Kurosh Dabbagh @_Kudaes_ ]

Call stack spoofing has reached Rust🙌. I have rewritten Unwinder and it is now a complete and stable weaponization of SilentMoonWalk technique. I have also added support for indirect syscalls and will be adding new features very soon.

🔗 https://github.com/Kudaes/Unwinder

🐥 [ tweet ]
👍5
😈 [ SkelSec @SkelSec ]

As I'm getting more sponsors I can make time to deal with all the reorg necessary after the closure of Porchetta.
Another ex-porchetta exclusive repo has been published on Github: evilrdp
I have received good feedback from users about this one.

🔗 https://github.com/skelsec/evilrdp

🐥 [ tweet ]
🔥7👍1
😈 [ Dirk-jan @_dirkjan ]

It's been quiet for a while around bloodhound Python, however I'm happy to share that I am now maintaining the project at my personal GitHub. The latest version fixes many bugs/issues, also thanks to the many PRs that were submitted (thanks all!).

🔗 https://github.com/dirkjanm/bloodhound.py

🐥 [ tweet ]
👍8
😈 [ Octoberfest7 @Octoberfest73 ]

It's not new, but good work deserves a shoutout regardless. Great article from @zyn3rgy on running tools from a Windows attack platform through a SOCKS proxy. Lots to be said for avoiding IOC's on target but still being able to leverage powerful tools.

🔗 https://posts.specterops.io/proxy-windows-tooling-via-socks-c1af66daeef3

🐥 [ tweet ]
😢1
😈 [ Rasta Mouse @_RastaMouse ]

🔗 https://github.com/gatariee/Winton

"focus on stealth". Uses cmd.exe, CreateRemoteThread, RWX, unbacked memory, and 0x0 thread start addresses...

🐥 [ tweet ]

yet another opsec c2
😁6🔥1
😈 [ SkelSec @SkelSec ]

Updates on all my projects:
All projects have been reorganized, the default branch names are now `main` for every project.
All projects -where applicable- now set up with github actions which freezes the examples as windows executables, and puts them on:

🔗 https://foss.skelsecprojects.com/

🐥 [ tweet ]
🔥5
😈 [ BlackSnufkin @BlackSnufkin42 ]

yet another AV killer tool using BYOVD

Now i am like the cool kids 👻

🔗 https://github.com/BlackSnufkin/GhostDriver

🐥 [ tweet ]
👍3
😈 [ Rad K. @rad9800 ]

I decided to wrap all the various features I PoC'd recently into one project to make it easier for you to use.
- No CRT
- Unhook from system32/knowndlls
- LL with work items
- Clear VEH, DLL notifs, HWBPs
- Compile time API hashing
- Configurable
- C++17

🔗 https://github.com/rad9800/WTSRM2

🐥 [ tweet ]
👍5
😈 [ DisK0nn3cT @DisK0nn3cT ]

Just released an update to the ScrapedIn tool. This tool has been very handy on red team and social engineering engagements! Please submit any bugs and I’ll get them squared away.

🔗 https://github.com/dchrastil/ScrapedIn

🐥 [ tweet ]
🔥3
😈 [ daem0nc0re @daem0nc0re ]

To dive more advanced low layer things such as hypervisor, I'm reviewing Windows kernelmode rootkit techniques, and created a repositry for research and educational purpose.
More PoCs will be added later (filesystem/network mini-filter things especially).

🔗 https://github.com/daem0nc0re/VectorKernel

🐥 [ tweet ]
👍7
😈 [ TrustedSec @TrustedSec ]

In our new #blog post, Senior Security Consultant @n00py1 shows us why you don't need a drawer full of fancy tools to pivot through networks—just some Windows #OpenSSH magic. Read it now!

🔗 https://hubs.ly/Q02b_c620

🐥 [ tweet ]
👍5🔥1
Offensive Xwitter
😈 [ Elliot @ElliotKillick ] The full and open source code used in "Perfect DLL Hijacking" has now been released on GitHub: LdrLockLiberator 🔗 https://github.com/ElliotKillick/LdrLockLiberator 🐥 [ tweet ]
😈 [ Elliot @ElliotKillick ]

What is Loader Lock? 🤔 Going BEYOND undocumented, we delve into the heart of the modern Windows loader investigating some internals for the first time and demystifying Loader Lock. 🔒 Check out the research article

🔗 https://elliotonsecurity.com/what-is-loader-lock/

🐥 [ tweet ]
🤯3
😈 [ @belette_timorée @belettet1m0ree ]

Hello! Yet another way to exploit WSUS misconfiguration.. Essentially relaying to ADCS for ESC8 attack. Hope you enjoy reading :). Thank's to @GoSecure_Inc for all the inspiration!

🔗 https://j4s0nmo0n.github.io/belettetimoree.github.io/2023-12-01-WSUS-to-ESC8.html

🐥 [ tweet ]
🔥8
😈 [ Bad Cyber @badcybercom ]

Dieselgate, but for trains - some heavyweight hardware hacking.

Story about trains that broke down and analysis that discovered it was not a coincidence.

🔗 https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/

🐥 [ tweet ]

какая-то лютейшая байка про реверс поездов
👍4
😈 [ Akamai Security Intelligence Group @akamai_research ]

Turns out, sometimes it isn't DNS... it's DHCP 👀

See @oridavid123's research on how DHCP can be used to spoof DNS records- potentially leading to Active Directory compromise.

Worst part? No credentials needed, just network access.

Full write-up:

🔗 https://www.akamai.com/blog/security-research/spoofing-dns-by-abusing-dhcp?filter=123

🐥 [ tweet ]
🤯5👍2