Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ Rhino Security Labs @RhinoSecurity ]

New Blog Post: CVE-2024-2448: Authenticated Command Injection In Progress Kemp LoadMaster

🔗 https://rhinosecuritylabs.com/research/cve-2024-2448-kemp-loadmaster/

🐥 [ tweet ]
👍2🤯1
😈 [ Evan McBroom @mcbroom_evan ]

I just published a blog and tool for the LSA Whisperer work that was presented at the SpecterOps Conference (SOCON) back in March.

If you are interested in getting credentials from LSASS without accessing its memory, check it out!

Blog:
🔗 https://medium.com/specter-ops-posts/lsa-whisperer-20874277ea3b

Tool:
🔗 https://github.com/Meowmycks/LetMeowIn

Crossposted on GH:
🔗 https://gist.github.com/EvanMcBroom/dceb1c7070ee3278eaedd04b42aed279

🐥 [ tweet ]
🔥6
😈 [ Synacktiv @Synacktiv ]

We are starting a new series of blog posts on post-quantum cryptography! Check-out our first article which gives an introduction to modern cryptography concepts.

🔗 https://www.synacktiv.com/en/publications/quantum-readiness-introduction-to-modern-cryptography

🐥 [ tweet ]

ничего не понятности пост
👍6😁2
😈 [ Synacktiv @Synacktiv ]

In our latest blogpost, @croco_byte presents an often overlooked AD attack surface related to OUs ACLs,with the release of a dedicated exploitation tool, OUned[.]py:

🔗 https://github.com/synacktiv/OUned
🔗 https://www.synacktiv.com/publications/ounedpy-exploiting-hidden-organizational-units-acl-attack-vectors-in-active-directory

🐥 [ tweet ]
👍4
А Дом Тихий когда подпишется, а, а, а, а, а?)))) Поняли шутку?)))0)
😁9🔥5🥱2
😈 [ soka @pentest_soka ]

I just released a series of 2 blog posts about increasing your stealth capabilities during offensive operations. I hope you will find something useful!

🔗 https://sokarepo.github.io/redteam/2024/01/04/increase-your-stealth-capabilities-part1.html
🔗 https://sokarepo.github.io/redteam/2024/01/04/increase-your-stealth-capabilities-part2.html

🐥 [ tweet ]
🔥6👍1
😈 [ Florian @floesen_ ]

Did you know that LSASS has the ability to execute arbitrary kernel-mode addresses? I wrote a small proof of concept that allows administrators to execute unsigned code in the kernel if LSA Protection is disabled.

🔗 https://github.com/floesen/KExecDD

🐥 [ tweet ]
🔥7👍1
Спасибо за круглое число 🤝
10к и правда много для канала, куда я складываю свой «список для чтения», всех обнимаю ❤️
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥18👍3
This media is not supported in your browser
VIEW IN TELEGRAM
🔥17
😈 [ Justin Elze @HackingLZ ]

Talking about lack of public bat builders last week this one has been going for a while

🔗 https://github.com/KDot227/SomalifuscatorV2

🐥 [ tweet ]
👍2
😈 [ PELock @PELock ]

Most advanced code mutation, obfuscation & reverse engineering resources I have seen in my life, jaw dropped, deserve more recognition @BackEngineerLab @_xeroxz

🔗 https://blog.back.engineering/

🐥 [ tweet ]
🔥6
😈 [ Soumyani1 @reveng007 ]

Just like LinkedIn, posting the same here too (tradition :))

Those who attended my demo at @BlackHatEvents , if have any questions and stuff please let me know.

Reach out to me in here, my DMs are open! I have uploaded V2 of my DarkWidow at:

🔗 https://github.com/reveng007/DarkWidow

🐥 [ tweet ]
🔥6👍2
😈 [ Thorsten E. @endi24 ]

The only PowerShell Command you will ever need to find out who did what in Active Directory

by @PrzemyslawKlys

🔗 https://evotec.pl/the-only-powershell-command-you-will-ever-need-to-find-out-who-did-what-in-active-directory/

🐥 [ tweet ]
🔥4👍2
😈 [ ap @decoder_it ]

"Hello: I'm your Domain Administrator and I want to authenticate against you". My #SilverPotato is out, check the blog post: 😃

🔗 https://decoder.cloud/2024/04/24/hello-im-your-domain-admin-and-i-want-to-authenticate-against-you/

🐥 [ tweet ]
🔥4
🔥3
😈 [ MDSec @MDSecLabs ]

New post on the blog… Exploiting CVE-2024-21111 : Local Privilege Escalation in Oracle VirtualBox by @filip_dragovic

🔗 https://www.mdsec.co.uk/2024/04/cve-2024-21111-local-privilege-escalation-in-oracle-virtualbox/

🐥 [ tweet ]
👍4🔥1
MS-DOS 4.0 опенсорснули под MIT 🌝

https://github.com/microsoft/MS-DOS/tree/main/v4.0
🔥8🤯5👍1🥱1
😈 [ Lsec @lsecqt ]

Recently, I created a YT video on how to utilize Discord as C2 traffic broker:

Amazing job by @checkymander and the whole Mythic C2 team!
Great work guys!

🔗 https://youtu.be/YluiBE_E4ts

🐥 [ tweet ]
👍6🥱3