Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ Charlie Bromberg « Shutdown » @_nwodtuhs ]

🎉 After >1y of hard work, @AzeTIIx and I are thrilled to release v2 of The Hacker Recipes!

We moved away from GitBook and now have control over both engine & hosting 🥹
1st addition for contributors: your work is being highlighted across the site! 🫡

🔗 https://thehacker.recipes/

🐥 [ tweet ]
👍15
😈 [ SandboxEscaper @big_polar_bear2 ]

It is shit, I feel like I failed. Waste of time. I only added the LLL portion in the last month, but it is such a complicated topic, I just didn't get it to work well enough. Hopefully the number theoretical portion in paper.pdf is useful.

🔗 https://github.com/Big-polar-bear/factorization

🐥 [ tweet ]

что-то новое про факторизацию Ферма, используя алгоритм Ленстры-Ленстры-Ловаса (LLL)
🔥8🤯2🤔1
😈 [ VIZIT @vizitcondoms ]

Мы, кстати, предоставляем защиту на случаи, если сажаете свои джеты куда ни попадя

🐥 [ tweet ]

после 10й просьбы прокомментировать задержание отвечу всем разом цитатой из тви для сохранения аутентичности канала
😁15🔥5👍3😢1🍌1
😈 [ Przemysław Kłys @PrzemyslawKlys ]

If you're into #ActiveDirectory, keep it clean from stale objects. CleanupMonster, my new #PowerShell module, can help you with that. I wrote a blog post about it to make it easier to implement.

It has fancy reporting and lots of customizations:

🔗 https://evotec.xyz/mastering-active-directory-hygiene-automating-stale-computer-cleanup-with-cleanupmonster/

🐥 [ tweet ]
👍7
😈 [ Alisa Esage Шевченко @alisaesage ]

Best research of Windows IPv6 RCE bug that I've seen so far (by ynwarcs). Still plenty of room for exploit development.

🔗 https://github.com/ynwarcs/CVE-2024-38063

🐥 [ tweet ]
🔥14🥱2
😈 [ Austin Hudson @ilove2pwn_ ]

Hopefully, should be simpler in the very near future to build COM/MSRPC clients & servers ( with SEH __try/__except/__finally support ) on Unix with mingw-w64 & clang with GNU LD.

I'll be uploading an example sometime in the next few weeks depending on how busy I am.

🐥 [ tweet ]
👍4
😈 [ Viking @Vikingfr ]

"SuperFetchQuery" can be useful for some scenarios like Red Team, Exploit Dev or Maldev. Let’s take a look!

🔗 https://v1k1ngfr.github.io/superfetchquery-superpower/

🐥 [ tweet ]
🔥6
😈 [ S3cur3Th1sSh1t @ShitSecure ]

Want to reflectively load MSVC compiled rust binaries e.G. from Powershell, C# or similar?

You have two options from my current perspective:
1) Adjust your PE-Loader to do "something" (unknown yet) for proper execution
2) Remove default main as shown:

🔗 https://gist.github.com/S3cur3Th1sSh1t/bbde56e01d7440ee97b69f4eb179f4cb

🐥 [ tweet ][ quote ]
👍9🔥1
😈 [ CICADA8Research @CICADA8Research ]

Our new article about privilege escalation via vulnerable MSI files. All roads lead to NT AUTHORIRTY\SYSTEM :)

🔗 https://cicada-8.medium.com/evil-msi-a-long-story-about-vulnerabilities-in-msi-files-1a2a1acaf01c
🔗 https://github.com/CICADA8-Research/MyMSIAnalyzer

🐥 [ tweet ]
👍13🔥7🤯2🥱1
😈 [ Jason Lang @curi0usJack ]

It's been a while since I've gotten to modify a GPO through a proxy as part of a red team. Fun and terrifying! If you're in that scenario now, this might help:

🔗 https://trustedsec.com/blog/weaponizing-group-policy-objects-access

🐥 [ tweet ]
👍5🔥2🥱1
😈 [ Grzegorz Tworek @0gtweet ]

Listing all processes keeping particular file open is not a trivial task but since Vista we have a special syscall parameter for such purpose. Microsoft says "reserved for system use" but I was brave enough to wrap it into PowerShell function. Enjoy!

🔗 https://github.com/gtworek/PSBits/blob/master/Misc2/Get-PidsForOpenFile.ps1

🐥 [ tweet ]
🔥15👍2
😈 [ DSAS by INJECT @DevSecAS ]

🆕 Most cryptographers and packers use various methods to unpack and run a PE file from memory.

The most common techniques to this day are RunPE and LoadPE 👨‍💻

🔗 https://injectexp.dev/b/LoadLibraryReloaded
🔗 https://news.1rj.ru/str/INJECTCRYPT/156

🐥 [ tweet ]
🔥6👍3🍌1
😈 [ Alice Climent-Pommeret @AliceCliment ]

Hi there!

My latest article on the @harfanglab blog has just been published!

I'm talking about unpacking, XMRig, R77 and FIN7 (or not 🤓)

A special S/O to @splinter_code @JusticeRage and @securechicken

To check it out ⬇️

🔗 https://harfanglab.io/insidethelab/unpacking-packxor/

🐥 [ tweet ][ quote ]
🔥3
😈 [ William Burgess @joehowwolf ]

New CS Blog - Revisiting the UDRL Part 3: If you like the idea of loading a custom c2 channel in your UDRL then this blog may be of interest 👀

🔗 https://www.cobaltstrike.com/blog/revisiting-the-udrl-part-3-beacon-user-data

🐥 [ tweet ]
👍3
😈 [ Praetorian @praetorianlabs ]

🔥 Bypassing fully patched endpoint detection with Goffloader

We’re excited to introduce Goffloader, an open-source Golang COFFLoader. Compatible with Cobalt Strike BOFs 😉

Read more on our blog here:

🔗 https://www.praetorian.com/blog/introducing-goffloader-a-pure-go-implementation-of-an-in-memory-coffloader-and-pe-loader/

🐥 [ tweet ]
🔥11👍1
😈 [ CoreLabs Research @CoreAdvisories ]

In his latest blog, Core Labs' @ricnar456 takes a deep dive into CVE-2024-30051, reversing this Windows #vulnerability to create a functional #PoC.

🔗 https://www.coresecurity.com/core-labs/articles/windows-dwm-core-library-elevation-privilege-vulnerability-cve-2024-30051

🐥 [ tweet ]
🔥7👍1
😈 [ Maurice Heumann @momo5502 ]

I have finished my blog post about my journey through KiUserExceptionDispatcher and how I added exception support to my emulator :D

🔗 https://momo5502.com/posts/2024-09-07-a-journey-through-kiuserexceptiondispatcher/

🐥 [ tweet ]
👍3🤯1
😈 [ Cas van Cooten @chvancooten ]

I just published the pre-recorded video version of my Nimplant demonstration for @BlackHatEvents Arsenal 2024! Check it out if you're interested in Nimplant and its new features, such as the Rust implant.

📽️ Recording available here:
🔗 https://youtu.be/9xQGjdPyDJc

🐥 [ tweet ]
👍2🔥1
Forwarded from Just Security
This media is not supported in your browser
VIEW IN TELEGRAM
Опубликовали видеоролик о том, как прошла ежегодная независимая премия Pentest award 2024!

Радостные лица, толпа заряженных специалистов, и, конечно, счастливые победители с наградами в руках — настоящий праздник этичного хакинга.

Здорово было встретится в офлайне со старыми друзьями и коллегами, познакомиться с новыми людьми, обменяться знаниями и идеями, поговорить о важном, профессиональном, наболевшем.

До встречи в 2025 году 👋

Отдельная благодарность партнерам проекта: BI.ZONE Bug Bounty, VK Bug Bounty, OFFZONE и CyberED.

📺 Полное видео
🔗 Pentest award (архив)
@justsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
👍7😢2🥱2🔥1
😈 [ Daniel @0x64616e ]

Do you like ZSH, SOCKS proxies and Impacket? Then you might want to check this out:

🔗 https://github.com/dadevel/impacket-zsh-integration

🐥 [ tweet ]

Интересно посмотреть на подходы других людей к вопросу менеджерства конфигами проксичейнс, я, например, делаю это так:

🔗 https://github.com/snovvcrash/dotfiles-linux/blob/2c4ab52c09749190c63a8e05187c28800e196f0a/system/funcs#L62-L74
👍4