Offensive Xwitter – Telegram
Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ skelsec, SkelSec ]

Long time since I last wrote an article. Nothing earth-shattering, but fun!

🔗 https://skelsec.medium.com/lsass-needs-an-iv-57b7333d50d8

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ Dinosn, Nicolas Krassas ]

Articles with ready to use commands for pentest and CTF

https://t.co/zMnvHt01qU

🔗 https://hideandsec.sh/books/cheatsheets-82c

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ DirectoryRanger, DirectoryRanger ]

WMEye. tool for performing Lateral Movement using WMI and remote MSBuild Execution
https://t.co/wi9ZdNVrof

🔗 https://github.com/pwn1sher/WMEye

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ DirectoryRanger, DirectoryRanger ]

S4uDelegator. tool to perform S4U logon with SeTcbPrivilege, by @@daem0nc0re
https://t.co/7qFTFtX6Um

🔗 https://github.com/daem0nc0re/PrivFu#s4udelegator

🐥 [ tweet ]
👍1
😈 [ m3g9tr0n, Spiros Fraganastasis ]

How the Active Directory Replication Model Works
https://t.co/oQKPMswqK5

🔗 https://premglitz.wordpress.com/2013/03/20/how-the-active-directory-replication-model-works/

🐥 [ tweet ]
🔥2👍1
😈 [ citronneur, Sylvain Peyrefitte ]

Time Travel Debugging for #IDA https://t.co/9QRB0UBuAy

🔗 https://github.com/airbus-cert/ttddbg

🐥 [ tweet ]
👍1
Forwarded from Offensive Xwitter Eye
👹 [ snovvcrash, sn🥶vvcr💥sh ]

Two-week security assessment is over, finally… Way too many lessons learned, oh well. Here’s the final step of taking down the critical OpenShift cluster with a single curl (hard-coded tokens is always a bad idea). So current mood is like the Burning Chrome last paragraphs 🫡

🐥 [ tweet ]
😈 [ DebugPrivilege, • ]

I came across a video of a talk from @MSwannMSFT on Intrusion Detection with Graphs https://t.co/4hKezgfM6N - interesting talk for blue teamers!

🔗 https://youtu.be/tGWSnuyZ4GQ

🐥 [ tweet ]
⚠️ DISCLAIMER ⚠️

‼️ All information posted in this channel (https://news.1rj.ru/str/OffensiveTwitter) is intended for research and/or educational purposes only.

‼️ The owner of this channel is NOT responsible for any illegal use of the information this channel is providing or referring to.

‼️ The owner of this channel does NOT promote any illegal activity related to unethical hacking, cybercrimes, malware distribution, etc.

‼️ Remember that computer crimes are ALWAYS punishable by the law, so please do watch what you are doing.

#disclaimer
😁8
👍1
😈 [ vxunderground, vx-underground ]

We've updated the vx-underground Malware Analysis collection. We have added 13 new papers courtesy of @malpedia.

Check it out here: https://t.co/djuVYEkbLT

Have a nice day.

🔗 https://www.vx-underground.org/malware_defense.html#malware_analysis

🐥 [ tweet ]
😈 [ HackingLZ, Justin ]

Since everyone is mentioning AzureAD to protect assets instead of putting them directly on the internet...Keep this in mind for future egress detections. https://t.co/mvgebEssdW

🔗 https://www.trustedsec.com/blog/azure-application-proxy-c2/

🐥 [ tweet ]