😈 [ Rtl Dallas @RtlDallas ]
New update for Draugr! 🙂
Now supports indirect syscalls with a synthetic stack frame. I’ve removed Draugr-Strike and replaced it with Cobalt Strike's process injection kit (Thread Spoof or Early Bird) using indirect syscalls and a synthetic stack frame.
🔗 https://github.com/NtDallas/Draugr
🐥 [ tweet ]
New update for Draugr! 🙂
Now supports indirect syscalls with a synthetic stack frame. I’ve removed Draugr-Strike and replaced it with Cobalt Strike's process injection kit (Thread Spoof or Early Bird) using indirect syscalls and a synthetic stack frame.
🔗 https://github.com/NtDallas/Draugr
🐥 [ tweet ]
😁2
😈 [ 0SKR @saab_sec ]
❗ Blog Alert ❗
🔴 Introducing a thread hijacking ttp variant called Phantom call.
🔴 Discussion on effect of stack alignment on SIM instructions/registers.
🔴 In depth analysis of Win32 api
🔴 Weaponizing
🔗 https://sabotagesec.com/thread-hijacking-iceberg-deep-dive-into-phantom-call-rtlremotecall/
🐥 [ tweet ]
❗ Blog Alert ❗
🔴 Introducing a thread hijacking ttp variant called Phantom call.
🔴 Discussion on effect of stack alignment on SIM instructions/registers.
🔴 In depth analysis of Win32 api
RtlRemoteCall🔴 Weaponizing
RtlRemoteCall🔗 https://sabotagesec.com/thread-hijacking-iceberg-deep-dive-into-phantom-call-rtlremotecall/
🐥 [ tweet ]
🔥7👍4🤯4
Мир, труд, май и PHDays 2025 (22–24 мая)
Грядущий ПэХэДэйз будет особенным, ведь в довесок ко всем стандартным вкусностям в виде докладов, наливайки и нетворкинга с коллегами вас ждет порция хардкор-стайл материала для Offense-трека, где мы (a.k.a.🟥 SWARM) будем говорить на сложные темы наступательной кибербезопасности. Ответственно разглашенные нолики, непубличные TTP продвинутых атакующих, инструментарий уровня APT, невыдуманные кейсы с проектов, о которых невозможно молчать, и многое другое.
В остальном по классике:
🤖 Форум и фестиваль в кибергороде
🗡 Кибербитва (a.k.a. Standoff 15)
🔭 Научпоп и искусство
👨🎓 Практикумы и воркшопы
Ну и, разумеется, самое главное — боевой клич на CFP прямо🔜 здесь 🔙
Грядущий ПэХэДэйз будет особенным, ведь в довесок ко всем стандартным вкусностям в виде докладов, наливайки и нетворкинга с коллегами вас ждет порция хардкор-стайл материала для Offense-трека, где мы (a.k.a.
В остальном по классике:
Ну и, разумеется, самое главное — боевой клич на CFP прямо
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥41👍12🍌11🥱9😢2
😈 [ S3cur3Th1sSh1t @ShitSecure ]
Bypass AMSI in 2025, my newest blog post is published 🥳! A review on what changed over the last years and what's still efficient today.
🔗 https://en.r-tec.net/r-tec-blog-bypass-amsi-in-2025.html
🐥 [ tweet ]
Bypass AMSI in 2025, my newest blog post is published 🥳! A review on what changed over the last years and what's still efficient today.
🔗 https://en.r-tec.net/r-tec-blog-bypass-amsi-in-2025.html
🐥 [ tweet ]
🔥19
😈 [ Synacktiv @Synacktiv ]
In our latest article, @croco_byte and @SScaum demonstrate a trick allowing to make Windows SMB clients fall back to WebDav HTTP authentication, enhancing the NTLM and Kerberos relaying capabilities of multicast poisoning attacks!
🔗 https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking
🐥 [ tweet ]
In our latest article, @croco_byte and @SScaum demonstrate a trick allowing to make Windows SMB clients fall back to WebDav HTTP authentication, enhancing the NTLM and Kerberos relaying capabilities of multicast poisoning attacks!
🔗 https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking
🐥 [ tweet ]
👍7🥱3
😈 [ T3nb3w @T3nb3w ]
🚀 New Blog & PoC: Abusing IDispatch for COM Object Access & PPL Injection
Leveraging STDFONT via IDispatch to inject into PPL processes & access LSASS. Inspired by James Forshaw's research!
Blog:
🔗 https://mohamed-fakroud.gitbook.io/red-teamings-dojo/abusing-idispatch-for-trapped-com-object-access-and-injecting-into-ppl-processes
Code:
🔗 https://github.com/T3nb3w/ComDotNetExploit
Original:
🔗 https://googleprojectzero.blogspot.com/2025/01/windows-bug-class-accessing-trapped-com.html
🐥 [ tweet ]
🚀 New Blog & PoC: Abusing IDispatch for COM Object Access & PPL Injection
Leveraging STDFONT via IDispatch to inject into PPL processes & access LSASS. Inspired by James Forshaw's research!
Blog:
🔗 https://mohamed-fakroud.gitbook.io/red-teamings-dojo/abusing-idispatch-for-trapped-com-object-access-and-injecting-into-ppl-processes
Code:
🔗 https://github.com/T3nb3w/ComDotNetExploit
Original:
🔗 https://googleprojectzero.blogspot.com/2025/01/windows-bug-class-accessing-trapped-com.html
🐥 [ tweet ]
🤯5🥱3
😈 [ Mayfly @M4yFly ]
New Active Directory Mindmap v2025.03! 🚀
📖 Readable version:
🔗 https://orange-cyberdefense.github.io/ocd-mindmaps/img/mindmap_ad_dark_classic_2025.03.excalidraw.noscript
🔧 Now fully generated from markdown files — way easier to update and maintain!
💡 Got improvements? PRs welcome! 👇
🔗 https://github.com/Orange-Cyberdefense/ocd-mindmaps/tree/main/excalimap/mindmap/ad
🐥 [ tweet ]
New Active Directory Mindmap v2025.03! 🚀
📖 Readable version:
🔗 https://orange-cyberdefense.github.io/ocd-mindmaps/img/mindmap_ad_dark_classic_2025.03.excalidraw.noscript
🔧 Now fully generated from markdown files — way easier to update and maintain!
💡 Got improvements? PRs welcome! 👇
🔗 https://github.com/Orange-Cyberdefense/ocd-mindmaps/tree/main/excalimap/mindmap/ad
🐥 [ tweet ]
🔥23👍9🥱2
😈 [ TrustedSec @TrustedSec ]
A Red Team engagement is a serious commitment for any org who wants to improve their security posture. In our new blog, @curi0usJack breaks down some goals of a Red Team engagement so that you can better measure its success. Read it now!
🔗 https://trustedsec.com/blog/measuring-the-success-of-your-adversary-simulations
🐥 [ tweet ]
A Red Team engagement is a serious commitment for any org who wants to improve their security posture. In our new blog, @curi0usJack breaks down some goals of a Red Team engagement so that you can better measure its success. Read it now!
🔗 https://trustedsec.com/blog/measuring-the-success-of-your-adversary-simulations
🐥 [ tweet ]
🔥6🥱6🤔1
😈 [ 📔 Michael Grafnetter @MGrafnetter ]
New Indicator of Compromise (IoC) by the NTLM Relay Attack with Shadow Credentials, thanks to bugs in Impacket, a popular Python implementation. Will probably be fixed in the near future.
🔗 https://www.dsinternals.com/en/indicator-of-compromise-shadow-credentials-ntlm-relay-impacket/
🐥 [ tweet ]
New Indicator of Compromise (IoC) by the NTLM Relay Attack with Shadow Credentials, thanks to bugs in Impacket, a popular Python implementation. Will probably be fixed in the near future.
🔗 https://www.dsinternals.com/en/indicator-of-compromise-shadow-credentials-ntlm-relay-impacket/
🐥 [ tweet ]
👍5
😈 [ MrAle98 @MrAle_98 ]
Hey there,
Finally published the article on the exploit for CVE-2025-21333-POC exploit.
Here the link to the article:
🔗 https://medium.com/@ale18109800/cve-2025-21333-windows-heap-based-buffer-overflow-analysis-d1b597ae4bae
🐥 [ tweet ]
Hey there,
Finally published the article on the exploit for CVE-2025-21333-POC exploit.
Here the link to the article:
🔗 https://medium.com/@ale18109800/cve-2025-21333-windows-heap-based-buffer-overflow-analysis-d1b597ae4bae
🐥 [ tweet ]
🔥8
😈 [ Oddvar Moe @Oddvarmoe ]
TIL, the attribute userWorkstations is still in play in modern windows 🤯
If you set the attribute on a user to something random the user cannot login to the computers anymore. Need privs to adjust, but I can see potential when you want to lock someone out for a while
🐥 [ tweet ]
TIL, the attribute userWorkstations is still in play in modern windows 🤯
If you set the attribute on a user to something random the user cannot login to the computers anymore. Need privs to adjust, but I can see potential when you want to lock someone out for a while
🐥 [ tweet ]
👍15😁4🤔4
😈 [ c0rnbread @0xC0rnbread ]
Today I'm releasing Xenon, a custom Mythic agent for Windows targets written in C.
Notable features include:
📁 Modular command/code inclusion
🦠 Malleable C2 Profile support
🪨 Compatible with Cobalt Strike BOFs
🔗 https://github.com/MythicAgents/Xenon
Blog series:
🔗 https://c0rnbread.com/creating-mythic-c2-agent-part1/
🐥 [ tweet ]
Today I'm releasing Xenon, a custom Mythic agent for Windows targets written in C.
Notable features include:
📁 Modular command/code inclusion
🦠 Malleable C2 Profile support
🪨 Compatible with Cobalt Strike BOFs
🔗 https://github.com/MythicAgents/Xenon
Blog series:
🔗 https://c0rnbread.com/creating-mythic-c2-agent-part1/
🐥 [ tweet ]
👍6
😈 [ Andrea Pierini @decoder_it ]
KrbRelayEx-RPC tool is out! 🎉
Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and relays the AP-REQ to access SMB shares or HTTP ADCS, all fully transparent to the victim ;)
🔗 https://github.com/decoder-it/KrbRelayEx-RPC
🐥 [ tweet ]
KrbRelayEx-RPC tool is out! 🎉
Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and relays the AP-REQ to access SMB shares or HTTP ADCS, all fully transparent to the victim ;)
🔗 https://github.com/decoder-it/KrbRelayEx-RPC
🐥 [ tweet ]
🔥10🥱1
😈 [ Thomas Seigneuret @_zblurx ]
Fear no more for LDAP Signing and Channel binding with Impacket based tools 😎
🔗 https://github.com/fortra/impacket/pull/1919
🐥 [ tweet ]
Fear no more for LDAP Signing and Channel binding with Impacket based tools 😎
🔗 https://github.com/fortra/impacket/pull/1919
🐥 [ tweet ]
🤔3👍2😁2
😈 [ 5pider @C5pider ]
spend some time rewriting stardust to be more minimalist and easier to use! I needed a generic minimal shellcode template that works for both x86 and x64 out of the box so I rewrote stardust to do so.
It is now written in C++20 and utilizing some of its language features. The template can be used to easily write shellcode fast in a more modern and less painful way.
The project can be compiled in release or debug mode, where as debug mode will just allow the use of DBG_PRINTF, which calls DbgPrint under the hood to print out strings to the currently attached debugger.
There are more things i have added so consider checking it out. I removed global variable access since i no longer use it nor require it (went for diff design heh). If u still need that feature I would recommend to change the branch to "globals-support" where the old version is hosted.
🔗 https://github.com/Cracked5pider/Stardust
🐥 [ tweet ]
spend some time rewriting stardust to be more minimalist and easier to use! I needed a generic minimal shellcode template that works for both x86 and x64 out of the box so I rewrote stardust to do so.
It is now written in C++20 and utilizing some of its language features. The template can be used to easily write shellcode fast in a more modern and less painful way.
The project can be compiled in release or debug mode, where as debug mode will just allow the use of DBG_PRINTF, which calls DbgPrint under the hood to print out strings to the currently attached debugger.
There are more things i have added so consider checking it out. I removed global variable access since i no longer use it nor require it (went for diff design heh). If u still need that feature I would recommend to change the branch to "globals-support" where the old version is hosted.
🔗 https://github.com/Cracked5pider/Stardust
🐥 [ tweet ]
👍2
😈 [ Bobby Cooke @0xBoku ]
Loki C2 blog drop! Thank you for all those who helped and all the support from the community. Big shoutout to @d_tranman and @chompie1337 for all their contributions to Loki C2! @IBM @IBMSecurity @XForce
🔗 https://securityintelligence.com/x-force/bypassing-windows-defender-application-control-loki-c2/
🐥 [ tweet ]
Loki C2 blog drop! Thank you for all those who helped and all the support from the community. Big shoutout to @d_tranman and @chompie1337 for all their contributions to Loki C2! @IBM @IBMSecurity @XForce
🔗 https://securityintelligence.com/x-force/bypassing-windows-defender-application-control-loki-c2/
🐥 [ tweet ]
👍5
Offensive Xwitter
Мир, труд, май и PHDays 2025 (22–24 мая) Грядущий ПэХэДэйз будет особенным, ведь в довесок ко всем стандартным вкусностям в виде докладов, наливайки и нетворкинга с коллегами вас ждет порция хардкор-стайл материала для Offense-трека, где мы (a.k.a. 🟥 SWARM)…
FYI, в этом году мы сотрудничаем с тремя фондами — «Подари Жизнь», «Улица Мира» и «Старость в радость» — и все средства, вырученные от продажи билетов, идут на благотворительность.
Проходка на закрытую часть феста🟰 пожертвование от 1.5к:
🔗 https://phdays.com/ru/
Проходка на закрытую часть феста
🔗 https://phdays.com/ru/
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥8👍5🥱4
😈 [ NetSPI @NetSPI ]
Beacon Object Files (BOFs) in C2 platforms limit developers.
Read NetSPI's blog post to explore a reference design for a new BOF portable executable (PE) concept that bridges the gap between modern C++ development and memory-executable C2 integration.
🔗 https://www.netspi.com/blog/technical-blog/network-pentesting/the-future-of-beacon-object-files/
🐥 [ tweet ]
Beacon Object Files (BOFs) in C2 platforms limit developers.
Read NetSPI's blog post to explore a reference design for a new BOF portable executable (PE) concept that bridges the gap between modern C++ development and memory-executable C2 integration.
🔗 https://www.netspi.com/blog/technical-blog/network-pentesting/the-future-of-beacon-object-files/
🐥 [ tweet ]
😈 [ Daniel @0x64616e ]
You can relay a user to LDAP that has WriteDacl/GenericAll on a valuable object but you can't use ShadowCredentials? Fear no more! You can now use "gain_fullcontrol" in ntlmrelayx ldapshell to give your account control over that object.
🔗 https://github.com/fortra/impacket/pull/1927
🐥 [ tweet ]
You can relay a user to LDAP that has WriteDacl/GenericAll on a valuable object but you can't use ShadowCredentials? Fear no more! You can now use "gain_fullcontrol" in ntlmrelayx ldapshell to give your account control over that object.
🔗 https://github.com/fortra/impacket/pull/1927
🐥 [ tweet ]
👍6🔥3