Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
Offensive Xwitter
😈 [ Zach Vorhies / Google Whistleblower @Perpetualmaniac ] Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language. Since I am a professional C++ programmer, let me decode this stack trace dump for you. 🔗 https://threadreaderap…
😈 [ Tavis Ormandy @taviso ]

This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n

🔗 https://threadreaderapp.com/thread/1814762302337654829.html

🐥 [ tweet ]

(все равно больше ничего интересного не происходит)
👍6🤔4🔥3😁1
😈 [ Max Harley @0xdab0 ]

Finally releasing a very beta version of my ADExplorerSnapshot Rust rewrite! There have been a ton of performance optimizations, edges added, and usability improvements since the quoted tweet. I'm really excited for people to start using and breaking it.

🔗 https://github.com/t94j0/adexplorersnapshot-rs

🐥 [ tweet ][ quote ]
👍7🥱3
😈 [ 5pider @C5pider ]

I haven't posted anything about Havoc in a while so imma share something I have been working on. Wrote a custom VM/Interpreter (based on the RISC-V instruction set) to execute exploits and other arbitrary code.
The client is now fully extendable and noscriptable via the Python API

🐥 [ tweet ]
👍7
😈 [ Aurélien Chalot @Defte_ ]

Super interesting way of blinding EDR's consoles!!

🔗 https://tierzerosecurity.co.nz/2024/07/23/edr-telemetry-blocker.html

🐥 [ tweet ]
🔥6👍2
😈 [ Print3M @Print3M_ ]

I wrote my first calc.exe "shellcode" in NASM. I find it a little strange that a lot of people write about malware development but almost no one talks about writing your own shellcode. I decided to write something on my own. (good comments, easy readable)

🔗 https://github.com/Print3M/shellcodes/blob/main/calc-exe.asm

🐥 [ tweet ]

#для_самых_маленьких
👍7🔥1
😈 [ Alex Neff @al3x_n3ff ]

A new module just got merged into NetExec, which extracts the security Questions for local users 🚀

Made by @Adamkadaban

If you want to know the details, you can read his blog post here:

🔗 https://hackback.zip/2024/05/08/Remotely-Dumping-Windows-Security-Questions-With-Impacket.html

🐥 [ tweet ]
🔥12👍2
😈 [ Kaspersky @kaspersky ]

A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.

Full story:
🔗 https://www.kaspersky.com/blog/zero-day-in-internet-explorer/51698/

🐥 [ tweet ]
👍7🔥3😁3
😈 [ Check Point Research @_CPResearch_ ]

In this blog we introduce Thread-Name Calling - A new process injection technique using Thread Name. We also discuss various scenarios in which this not widely-known API can be used for offense.

Blog:
🔗 https://research.checkpoint.com/2024/thread-name-calling-using-thread-name-for-offense/

PoC:
🔗 https://github.com/hasherezade/thread_namecalling

🐥 [ tweet ]
🔥4👍1🥱1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ ☣️ @0x6rss ]

My first blog post: Creating a PDF Dropper by Injecting Malicious JavaScript into a PDF with a Cobalt Strike Payload
For the source code and PoC, check out my blog post:👇

🔗 https://cti.monster/blog/2024/07/25/pdfdropper.html

🐥 [ tweet ]
👍9😁5🥱5🔥2🍌2
😈 [ Alisa Esage Шевченко @alisaesage ]

Nice little-known writeup on WhatsApp exploitation: < technically interesting for more than one reason

🔗 https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/

🐥 [ tweet ]
👍6🍌3
😈 [ CICADA8Research @CICADA8Research ]

Hi friends, we felt that the topic of in-memory payload execution was not covered enough, so we've collected our own notes and hacks that we use on pentests to execute in-memory (reflective) payloads.

Enjoy reading!

🔗 https://cicada-8.medium.com/osep-unleashed-the-advance-of-in-memory-payload-execution-c03a4c0d610a

🐥 [ tweet ]
🔥10👍7🥱3🤔1🤯1
😈 [ Daniel @0x64616e ]

Binding to port 445 on Windows without WinDivert. This is highly useful for NTLM relaying. Big thanks to @zyn3rgy for the talk:

🔗 https://youtu.be/iBqOOkQGJEA

🐥 [ tweet ][ quote ]
🔥9
😈 [ TrustedSec @TrustedSec ]

Today, TrustedSec is releasing #Specula (our previously internal framework) into the world, which will transform the Outlook email client into a beaconing C2 agent. @oddvarmoe and @freefirex2 walk through how to use Specula in our latest blog!

🔗 https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change

🐥 [ tweet ]
👍6🔥3
😈 [ PT SWARM @ptswarm ]

🤖 New article by our researcher Nikita Petrov: "From opcode to code: how AI chatbots can help with decompilation".

Read the blog post:

🔗 https://swarm.ptsecurity.com/from-opcode-to-code-how-ai-chatbots-can-help-with-decompilation/

🐥 [ tweet ]
👍6
😈 [ Will Harris @parityzero ]

With Chrome 127 on Windows, we're introducing enhanced encryption to protect sensitive data, starting with your cookies🍪! This helps protect your personal information and keeps your online accounts secure from hackers. Read more about this protection:

🔗 https://security.googleblog.com/2024/07/improving-security-of-chrome-cookies-on.html

🐥 [ tweet ]

гг, dploot
😢14👍2
😈 [ Dirk-jan @_dirkjan ]

New blog: Persisting on Entra ID applications and User Managed Identities with Federated Credentials.

In this blog we set up our own IdP with roadtools, allowing us to authenticate to apps and user managed identities with federated credentials 😀

🔗 https://dirkjanm.io/persisting-with-federated-credentials-entra-apps-managed-identities/

🐥 [ tweet ]
👍5🤔2