Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ Synacktiv @Synacktiv ]

In our latest blogpost, @croco_byte presents an often overlooked AD attack surface related to OUs ACLs,with the release of a dedicated exploitation tool, OUned[.]py:

🔗 https://github.com/synacktiv/OUned
🔗 https://www.synacktiv.com/publications/ounedpy-exploiting-hidden-organizational-units-acl-attack-vectors-in-active-directory

🐥 [ tweet ]
👍4
А Дом Тихий когда подпишется, а, а, а, а, а?)))) Поняли шутку?)))0)
😁9🔥5🥱2
😈 [ soka @pentest_soka ]

I just released a series of 2 blog posts about increasing your stealth capabilities during offensive operations. I hope you will find something useful!

🔗 https://sokarepo.github.io/redteam/2024/01/04/increase-your-stealth-capabilities-part1.html
🔗 https://sokarepo.github.io/redteam/2024/01/04/increase-your-stealth-capabilities-part2.html

🐥 [ tweet ]
🔥6👍1
😈 [ Florian @floesen_ ]

Did you know that LSASS has the ability to execute arbitrary kernel-mode addresses? I wrote a small proof of concept that allows administrators to execute unsigned code in the kernel if LSA Protection is disabled.

🔗 https://github.com/floesen/KExecDD

🐥 [ tweet ]
🔥7👍1
Спасибо за круглое число 🤝
10к и правда много для канала, куда я складываю свой «список для чтения», всех обнимаю ❤️
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥18👍3
This media is not supported in your browser
VIEW IN TELEGRAM
🔥17
😈 [ Justin Elze @HackingLZ ]

Talking about lack of public bat builders last week this one has been going for a while

🔗 https://github.com/KDot227/SomalifuscatorV2

🐥 [ tweet ]
👍2
😈 [ PELock @PELock ]

Most advanced code mutation, obfuscation & reverse engineering resources I have seen in my life, jaw dropped, deserve more recognition @BackEngineerLab @_xeroxz

🔗 https://blog.back.engineering/

🐥 [ tweet ]
🔥6
😈 [ Soumyani1 @reveng007 ]

Just like LinkedIn, posting the same here too (tradition :))

Those who attended my demo at @BlackHatEvents , if have any questions and stuff please let me know.

Reach out to me in here, my DMs are open! I have uploaded V2 of my DarkWidow at:

🔗 https://github.com/reveng007/DarkWidow

🐥 [ tweet ]
🔥6👍2
😈 [ Thorsten E. @endi24 ]

The only PowerShell Command you will ever need to find out who did what in Active Directory

by @PrzemyslawKlys

🔗 https://evotec.pl/the-only-powershell-command-you-will-ever-need-to-find-out-who-did-what-in-active-directory/

🐥 [ tweet ]
🔥4👍2
😈 [ ap @decoder_it ]

"Hello: I'm your Domain Administrator and I want to authenticate against you". My #SilverPotato is out, check the blog post: 😃

🔗 https://decoder.cloud/2024/04/24/hello-im-your-domain-admin-and-i-want-to-authenticate-against-you/

🐥 [ tweet ]
🔥4
🔥3
😈 [ MDSec @MDSecLabs ]

New post on the blog… Exploiting CVE-2024-21111 : Local Privilege Escalation in Oracle VirtualBox by @filip_dragovic

🔗 https://www.mdsec.co.uk/2024/04/cve-2024-21111-local-privilege-escalation-in-oracle-virtualbox/

🐥 [ tweet ]
👍4🔥1
MS-DOS 4.0 опенсорснули под MIT 🌝

https://github.com/microsoft/MS-DOS/tree/main/v4.0
🔥8🤯5👍1🥱1
😈 [ Lsec @lsecqt ]

Recently, I created a YT video on how to utilize Discord as C2 traffic broker:

Amazing job by @checkymander and the whole Mythic C2 team!
Great work guys!

🔗 https://youtu.be/YluiBE_E4ts

🐥 [ tweet ]
👍6🥱3
😈 [ Viking @Vikingfr ]

How named pipes and Powershell could be used for creating Windows bind / reverse shell re-using Windows SMB port ? I show you in this blog post 😉

🔗 https://v1k1ngfr.github.io/fuegoshell/

🐥 [ tweet ]
👍10
😈 [ ap @decoder_it ]

#SilverPotato works also with Kerberos using @tiraniddo I mentioned in my latest post trick.

You will get an AP-REQ with SPN of the desired target server. Relaying is now just one step away..

🐥 [ tweet ]
👍5