😈 [ mttaggart, Taggart ]
I'd just like to point out that a number of us have been providing free, high quality infosec content on Twitch for years without so much as a blurb in the Register.
@goproslowyo
@0xTib3rius
@Alh4zr3d
@xfootpics4salex
@ShawnLo
And many more at https://t.co/LnMWvE4jwN https://t.co/MB2rYdNPjC
🔗 https://infosecstreams.github.io/
🐥 [ tweet ][ quote ]
I'd just like to point out that a number of us have been providing free, high quality infosec content on Twitch for years without so much as a blurb in the Register.
@goproslowyo
@0xTib3rius
@Alh4zr3d
@xfootpics4salex
@ShawnLo
And many more at https://t.co/LnMWvE4jwN https://t.co/MB2rYdNPjC
🔗 https://infosecstreams.github.io/
🐥 [ tweet ][ quote ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]
Was trying to improve my #password #spraying approach in AD by previewing FGPPs and mapping them to the users they’re applied to, but it turns out you have to be an admin to do that 😒
🐥 [ tweet ]
Was trying to improve my #password #spraying approach in AD by previewing FGPPs and mapping them to the users they’re applied to, but it turns out you have to be an admin to do that 😒
🐥 [ tweet ]
🔥1
😈 [ CyberarkLabs, CyberArk Labs ]
Passwords and cookies are stored in Chrome’s memory in clear-text. Attackers can load into memory all the passwords that are stored in the password manager (“Login Data” file).
https://t.co/L1JRO22ktu
🔗 http://spr.ly/6017zZ6Ft
🐥 [ tweet ]
Passwords and cookies are stored in Chrome’s memory in clear-text. Attackers can load into memory all the passwords that are stored in the password manager (“Login Data” file).
https://t.co/L1JRO22ktu
🔗 http://spr.ly/6017zZ6Ft
🐥 [ tweet ]
👍3
😈 [ 0xBoku, Bobby Cooke ]
BokuLoader now uses its best evasion features out of the box, +ASM Caesar cipher string obfuscation, +bug fixes, and +code enhancements. Dropped 32bit for now and all around slimmed down the code. Needed a clean base for coming feature updates ;)
https://t.co/At0dcvYZF0
🔗 https://github.com/boku7/BokuLoader
🐥 [ tweet ]
BokuLoader now uses its best evasion features out of the box, +ASM Caesar cipher string obfuscation, +bug fixes, and +code enhancements. Dropped 32bit for now and all around slimmed down the code. Needed a clean base for coming feature updates ;)
https://t.co/At0dcvYZF0
🔗 https://github.com/boku7/BokuLoader
🐥 [ tweet ]
🔥2
😈 [ 0gtweet, Grzegorz Tworek ]
3 pieces of information:
1. The interesting one - if svchost.exe cannot find "Parameters" subkey, it tries to read ServiceDll entry from the parent (service) key!
2. The bad one - tools rarely check such DLLs.
3. The great one - my tool was just updated - https://t.co/ySr6QM0f3b
🔗 https://github.com/gtworek/PSBits/blob/master/Services/Get-ServiceDlls.ps1
🐥 [ tweet ]
3 pieces of information:
1. The interesting one - if svchost.exe cannot find "Parameters" subkey, it tries to read ServiceDll entry from the parent (service) key!
2. The bad one - tools rarely check such DLLs.
3. The great one - my tool was just updated - https://t.co/ySr6QM0f3b
🔗 https://github.com/gtworek/PSBits/blob/master/Services/Get-ServiceDlls.ps1
🐥 [ tweet ]
😈 [ _wald0, Andy Robbins ]
ICYMI: This week I published a 3-part blog series on managed identity attack paths in various #Azure services:
Part 1, Automation Accounts: https://t.co/gZ6QjGw6CE
Part 2, Logic Apps: https://t.co/3Jtw4rcHdm
Part 3, Function Apps: https://t.co/MJh46fqs2m
🔗 https://posts.specterops.io/82667d17187a
🔗 https://posts.specterops.io/52b29354fc54
🔗 https://posts.specterops.io/300065251cbe
🐥 [ tweet ]
ICYMI: This week I published a 3-part blog series on managed identity attack paths in various #Azure services:
Part 1, Automation Accounts: https://t.co/gZ6QjGw6CE
Part 2, Logic Apps: https://t.co/3Jtw4rcHdm
Part 3, Function Apps: https://t.co/MJh46fqs2m
🔗 https://posts.specterops.io/82667d17187a
🔗 https://posts.specterops.io/52b29354fc54
🔗 https://posts.specterops.io/300065251cbe
🐥 [ tweet ]
😈 [ Cneelis, Cn33liz ]
It's #BOFFriday so time for a new @OutflankNL C2-Tool-Collection update:
> Psx - Show detailed process information incl. OPSEC checks.
> Psc - Show detailed information from processes with established TCP and RDP connections.
https://t.co/Wq1obZDfRU
🔗 https://github.com/outflanknl/C2-Tool-Collection
🐥 [ tweet ]
It's #BOFFriday so time for a new @OutflankNL C2-Tool-Collection update:
> Psx - Show detailed process information incl. OPSEC checks.
> Psc - Show detailed information from processes with established TCP and RDP connections.
https://t.co/Wq1obZDfRU
🔗 https://github.com/outflanknl/C2-Tool-Collection
🐥 [ tweet ]
👍2
😈 [ Cx01N_, Cx01N ]
Here is the material from #defcon29 in case anyone missed last years.
https://t.co/4lk4Y6UWXe
🔗 https://github.com/BC-SECURITY/Beginners-Guide-to-Obfuscation
🐥 [ tweet ][ quote ]
Here is the material from #defcon29 in case anyone missed last years.
https://t.co/4lk4Y6UWXe
🔗 https://github.com/BC-SECURITY/Beginners-Guide-to-Obfuscation
🐥 [ tweet ][ quote ]
👍1
😈 [ _wald0, Andy Robbins ]
Today is Friday, which means it's #BloodHoundBasics day.
BloodHound collects user logons in a somewhat non-intuitive way. In this video I try my best explain exactly how BloodHound's logon session collection works: https://t.co/4XQqJ0Zulq
🔗 https://www.youtube.com/watch?v=q86VgM2Tafc
🐥 [ tweet ]
Today is Friday, which means it's #BloodHoundBasics day.
BloodHound collects user logons in a somewhat non-intuitive way. In this video I try my best explain exactly how BloodHound's logon session collection works: https://t.co/4XQqJ0Zulq
🔗 https://www.youtube.com/watch?v=q86VgM2Tafc
🐥 [ tweet ]
🔥2
😈 [ exploitph, Charlie Clark ]
Been working on some new features for PowerView, it's still a work in progress but just pushed a few, cert auth for LDAPS and StartTLS for Get-DomainObject, Get-DomainUser, Get-DomainComputer and Set-DomainObject 1/2
https://t.co/H9rrPiTZeD
🔗 https://github.com/0xe7/PowerSploit/blob/master/Recon/PowerView.ps1
🐥 [ tweet ]
Been working on some new features for PowerView, it's still a work in progress but just pushed a few, cert auth for LDAPS and StartTLS for Get-DomainObject, Get-DomainUser, Get-DomainComputer and Set-DomainObject 1/2
https://t.co/H9rrPiTZeD
🔗 https://github.com/0xe7/PowerSploit/blob/master/Recon/PowerView.ps1
🐥 [ tweet ]
😈 [ _RastaMouse, Rasta Mouse ]
[BLOG]
GPO WMI filters - how they can screw you over, and some ways to deal with them.
https://t.co/9kBZQlYw7D
🔗 https://rastamouse.me/ous-and-gpos-and-wmi-filters-oh-my/
🐥 [ tweet ]
[BLOG]
GPO WMI filters - how they can screw you over, and some ways to deal with them.
https://t.co/9kBZQlYw7D
🔗 https://rastamouse.me/ous-and-gpos-and-wmi-filters-oh-my/
🐥 [ tweet ]
😈 [ OscarAkaElvis, Óscar Alfonso Díaz ]
New Evil-WinRM release (v3.4). Released for the @uad360 cyber security event. C'mon @msftsecurity how about a new Defender signature? Let's dance 😁
https://t.co/PEwvSTxt8p
Thanks @CyberVaca_ @_Laox @arale61
#evilwinrm #winrm #hacking #pentesting
🔗 https://github.com/Hackplayers/evil-winrm
🐥 [ tweet ]
New Evil-WinRM release (v3.4). Released for the @uad360 cyber security event. C'mon @msftsecurity how about a new Defender signature? Let's dance 😁
https://t.co/PEwvSTxt8p
Thanks @CyberVaca_ @_Laox @arale61
#evilwinrm #winrm #hacking #pentesting
🔗 https://github.com/Hackplayers/evil-winrm
🐥 [ tweet ]
👍2
😈 [ 0xdf_, 0xdf ]
Meta is a fun box from @hackthebox_eu centered around image processing. There's exiftool and ImageMagick exploits, and then abusing environment variables with sudo neofetch.
https://t.co/dnavhTIrwF
🔗 https://0xdf.gitlab.io/2022/06/11/htb-meta.html
🐥 [ tweet ]
Meta is a fun box from @hackthebox_eu centered around image processing. There's exiftool and ImageMagick exploits, and then abusing environment variables with sudo neofetch.
https://t.co/dnavhTIrwF
🔗 https://0xdf.gitlab.io/2022/06/11/htb-meta.html
🐥 [ tweet ]
🔥2👍1
😈 [ ShitSecure, S3cur3Th1sSh1t ]
Made a short Video regarding to usage && feature denoscription for my Packer. Mostly for my Sponsors but maybe others will also find some interesting things in it as inspiration:
https://t.co/MsJ1sP0ZPt
🔗 https://www.youtube.com/watch?v=UHaIgdzqHDA
🐥 [ tweet ]
Made a short Video regarding to usage && feature denoscription for my Packer. Mostly for my Sponsors but maybe others will also find some interesting things in it as inspiration:
https://t.co/MsJ1sP0ZPt
🔗 https://www.youtube.com/watch?v=UHaIgdzqHDA
🐥 [ tweet ]
👍1🔥1
😈 [ ReconOne_, ReconOne ]
Want to quickly find publicly exposed MySql backup files? Try this 👇
Credits: @_bughunter
#recontips #AttackSurface #bugbountytips #mysql #reconone
🐥 [ tweet ]
Want to quickly find publicly exposed MySql backup files? Try this 👇
Credits: @_bughunter
#recontips #AttackSurface #bugbountytips #mysql #reconone
🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]
[#Tooling ⚔️] 🧵 (1/6) A thread of integrating #shellcode #fluctuation technique into DInjector: https://t.co/4VLQkuXO4q
Main credits to @mariuszbit, @_RastaMouse and @ShitSecure for their great tools and blogs which I heavily relied on here.
#redteam #maldev
🔗 https://github.com/snovvcrash/DInjector/blob/0ed4182035f9dcd15cf987519e5f1320f669e962/DInjector/Modules/CurrentThread.cs#L233-L458
🐥 [ tweet ]
[#Tooling ⚔️] 🧵 (1/6) A thread of integrating #shellcode #fluctuation technique into DInjector: https://t.co/4VLQkuXO4q
Main credits to @mariuszbit, @_RastaMouse and @ShitSecure for their great tools and blogs which I heavily relied on here.
#redteam #maldev
🔗 https://github.com/snovvcrash/DInjector/blob/0ed4182035f9dcd15cf987519e5f1320f669e962/DInjector/Modules/CurrentThread.cs#L233-L458
🐥 [ tweet ]
🔥3
😈 [ DirectoryRanger, DirectoryRanger ]
SharpWSUS. CSharp tool for lateral movement through WSUS
https://t.co/0hDHe6ePZs
🔗 https://github.com/nettitude/SharpWSUS
🐥 [ tweet ]
SharpWSUS. CSharp tool for lateral movement through WSUS
https://t.co/0hDHe6ePZs
🔗 https://github.com/nettitude/SharpWSUS
🐥 [ tweet ]
👍1
😈 [ ORCA10K, ORCA ]
it's been a while since the last time I played with some c code, so I had to publish something:
https://t.co/LtYkuL2mtq
🔗 https://gitlab.com/ORCA666/kcthijacklib
🐥 [ tweet ]
it's been a while since the last time I played with some c code, so I had to publish something:
https://t.co/LtYkuL2mtq
🔗 https://gitlab.com/ORCA666/kcthijacklib
🐥 [ tweet ]
🔥1
😈 [ 0gtweet, Grzegorz Tworek ]
The only difference between DnsGetCacheDataTable() and DnsGetCacheDataTableEx() is the first one returns only 15000 entries, while the second one allows you to raise such limit to MAXDWORD by specifying 1 as a parameter.
I need to disappoint you if you expect any documentation 🙄
🐥 [ tweet ]
The only difference between DnsGetCacheDataTable() and DnsGetCacheDataTableEx() is the first one returns only 15000 entries, while the second one allows you to raise such limit to MAXDWORD by specifying 1 as a parameter.
I need to disappoint you if you expect any documentation 🙄
🐥 [ tweet ]
👍2