Offensive Xwitter – Telegram
Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ albinowax, James Kettle ]

I've updated the Turbo Intruder documentation with some practical tips for long-running attacks. TLDR don't put five million responses in the table, you'll run out of RAM.
https://t.co/lhyH2hlOrn

🔗 https://portswigger.net/research/turbo-intruder-embracing-the-billion-request-attack

🐥 [ tweet ]
😈 [ Tarlogic, Tarlogic ]

The world grades everything. Students, restaurants and hotels, movies, books... #CyberSecurity couldn't be oblivious to this reality. That's why we have dedicated a post on our blog Ciber 4 All to the #CVSS framework.
https://t.co/rPbUFFuR7f

🔗 https://www.tarlogic.com/blog/cvss-scoring-it-vulnerabilities/

🐥 [ tweet ]
😈 [ vxunderground, vx-underground ]

We've updated the vx-underground Malware Defense collection. We have added 60 new papers.

Have a nice day.

Check it out here: https://t.co/djuVYEkbLT

🔗 https://www.vx-underground.org/malware_defense.html#malware_analysis

🐥 [ tweet ]
😈 [ vxunderground, vx-underground ]

We've updated the vx-underground malware collection.

- Xloader
- Enemybot
- WSL Malware
- Chromeloader/Choziosi
- Chaos / Yashma Ransomware
- Pymafka

Download malware. It is good for you.

Check it out here: https://t.co/L3GdoH9kLl

🔗 https://samples.vx-underground.org/samples/Families/

🐥 [ tweet ]
😈 [ decoder_it, ap ]

Calling msdt.exe is surprisingly sometimes legitimate 😅

🐥 [ tweet ]
😈 [ HackingLZ, Justin ]

But it's a private vetted tool which was the thing people always wanted...

🐥 [ tweet ]
😈 [ GoSecure_Inc, GoSecure ]

Read this analysis by GoSecure Titan Labs of the two vulnerabilities found in 3CX Phone Systems, authenticated command injection and privilege escalation: https://t.co/dhfxLA950o #pentesting #cybersecurity #GoSecureTitanLabs

🔗 https://www.gosecure.net/blog/2022/05/31/security-advisory-multiple-vulnerabilities-impact-3cx-phone-system/

🐥 [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

Fantastic Windows Logon types and Where to Find Credentials in Them, by @chiragsavla94
https://t.co/qFUEG8HdWC

🔗 https://www.alteredsecurity.com/post/fantastic-windows-logon-types-and-where-to-find-credentials-in-them

🐥 [ tweet ]
🔥1
😈 [ Tyl0us, Matt Eidelberg ]

Check out my talk focusing on shining a light on the mindset of a red team and how they covertly compromise an organization’s security. Lots of great TTPs and stories to share check it out #SourceZeroCon https://t.co/FiiVCJhi0t #netsec #redteam #evasion

🔗 http://bit.ly/3K3argl

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ aetsu, 𝕬𝖊𝖙𝖘𝖚 ]

A blueprint for evading industry leading endpoint protection in 2022 -> https://t.co/Vf69P9ZUuA

🔗 https://vanmieghem.io/blueprint-for-evading-edr-in-2022/

🐥 [ tweet ]
🔥2
Forwarded from Offensive Xwitter Eye
😈 [ harmj0y, Will Schroeder ]

In my first foray into what @moo_hax terms "Offensive ML", I took at shot at data mining documents for passwords using deep learning. You can read about the approach at https://t.co/oL7jBbPiJQ and can find the notebook + Dockerized model at https://t.co/jXsMDVEwOo

🔗 https://posts.specterops.io/deeppass-finding-passwords-with-deep-learning-4d31c534cd00
🔗 https://github.com/GhostPack/DeepPass

🐥 [ tweet ]
🔥1
Forwarded from Offensive Xwitter Eye
😈 [ C5pider, 5pider ]

Wrote a shitty Lsass memory parser. Always wanted to learn how mimikatz parses the Lsass memory. Harder than expected but got it to work. No code/memory cleanup for now lol.

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
👍2