Offensive Xwitter – Telegram
Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ DirectoryRanger, DirectoryRanger ]

Fantastic Windows Logon types and Where to Find Credentials in Them, by @chiragsavla94
https://t.co/qFUEG8HdWC

🔗 https://www.alteredsecurity.com/post/fantastic-windows-logon-types-and-where-to-find-credentials-in-them

🐥 [ tweet ]
🔥1
😈 [ Tyl0us, Matt Eidelberg ]

Check out my talk focusing on shining a light on the mindset of a red team and how they covertly compromise an organization’s security. Lots of great TTPs and stories to share check it out #SourceZeroCon https://t.co/FiiVCJhi0t #netsec #redteam #evasion

🔗 http://bit.ly/3K3argl

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ aetsu, 𝕬𝖊𝖙𝖘𝖚 ]

A blueprint for evading industry leading endpoint protection in 2022 -> https://t.co/Vf69P9ZUuA

🔗 https://vanmieghem.io/blueprint-for-evading-edr-in-2022/

🐥 [ tweet ]
🔥2
Forwarded from Offensive Xwitter Eye
😈 [ harmj0y, Will Schroeder ]

In my first foray into what @moo_hax terms "Offensive ML", I took at shot at data mining documents for passwords using deep learning. You can read about the approach at https://t.co/oL7jBbPiJQ and can find the notebook + Dockerized model at https://t.co/jXsMDVEwOo

🔗 https://posts.specterops.io/deeppass-finding-passwords-with-deep-learning-4d31c534cd00
🔗 https://github.com/GhostPack/DeepPass

🐥 [ tweet ]
🔥1
Forwarded from Offensive Xwitter Eye
😈 [ C5pider, 5pider ]

Wrote a shitty Lsass memory parser. Always wanted to learn how mimikatz parses the Lsass memory. Harder than expected but got it to work. No code/memory cleanup for now lol.

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
👍2
😈 [ skelsec, SkelSec ]

Long time since I last wrote an article. Nothing earth-shattering, but fun!

🔗 https://skelsec.medium.com/lsass-needs-an-iv-57b7333d50d8

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ Dinosn, Nicolas Krassas ]

Articles with ready to use commands for pentest and CTF

https://t.co/zMnvHt01qU

🔗 https://hideandsec.sh/books/cheatsheets-82c

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ DirectoryRanger, DirectoryRanger ]

WMEye. tool for performing Lateral Movement using WMI and remote MSBuild Execution
https://t.co/wi9ZdNVrof

🔗 https://github.com/pwn1sher/WMEye

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ DirectoryRanger, DirectoryRanger ]

S4uDelegator. tool to perform S4U logon with SeTcbPrivilege, by @@daem0nc0re
https://t.co/7qFTFtX6Um

🔗 https://github.com/daem0nc0re/PrivFu#s4udelegator

🐥 [ tweet ]
👍1
😈 [ m3g9tr0n, Spiros Fraganastasis ]

How the Active Directory Replication Model Works
https://t.co/oQKPMswqK5

🔗 https://premglitz.wordpress.com/2013/03/20/how-the-active-directory-replication-model-works/

🐥 [ tweet ]
🔥2👍1
😈 [ citronneur, Sylvain Peyrefitte ]

Time Travel Debugging for #IDA https://t.co/9QRB0UBuAy

🔗 https://github.com/airbus-cert/ttddbg

🐥 [ tweet ]
👍1
Forwarded from Offensive Xwitter Eye
👹 [ snovvcrash, sn🥶vvcr💥sh ]

Two-week security assessment is over, finally… Way too many lessons learned, oh well. Here’s the final step of taking down the critical OpenShift cluster with a single curl (hard-coded tokens is always a bad idea). So current mood is like the Burning Chrome last paragraphs 🫡

🐥 [ tweet ]