😈 [ DebugPrivilege, • ]
The right answer:
I've seen lots of incomplete answers, but only a few people got it right. Also, no. We technically don't even need SeDebugPrivilege :)
🐥 [ tweet ][ quote ]
The right answer:
I've seen lots of incomplete answers, but only a few people got it right. Also, no. We technically don't even need SeDebugPrivilege :)
🐥 [ tweet ][ quote ]
😈 [ PortSwiggerRes, PortSwigger Research ]
Bypassing CSP with dangling iframes by @garethheyes
https://t.co/G3yPQQfYR2
🔗 https://portswigger.net/research/bypassing-csp-with-dangling-iframes
🐥 [ tweet ]
Bypassing CSP with dangling iframes by @garethheyes
https://t.co/G3yPQQfYR2
🔗 https://portswigger.net/research/bypassing-csp-with-dangling-iframes
🐥 [ tweet ]
👍1
😈 [ hasherezade, hasherezade ]
Updated #mal_unpack (v0.9.5) is ready! check it out: https://t.co/OCcdgd5AiO // (#PEsieve-based)
🔗 https://github.com/hasherezade/mal_unpack/releases
🐥 [ tweet ]
Updated #mal_unpack (v0.9.5) is ready! check it out: https://t.co/OCcdgd5AiO // (#PEsieve-based)
🔗 https://github.com/hasherezade/mal_unpack/releases
🐥 [ tweet ]
👍1
😈 [ Tyl0us, Matt Eidelberg ]
Small update to ScareCrow. Shoutout to @mariuszbit for the feature request. Check it out: https://t.co/VIQVnKd2tJ
#netsec #redteam #EDR #evasion
🔗 https://github.com/optiv/ScareCrow
🐥 [ tweet ]
Small update to ScareCrow. Shoutout to @mariuszbit for the feature request. Check it out: https://t.co/VIQVnKd2tJ
#netsec #redteam #EDR #evasion
🔗 https://github.com/optiv/ScareCrow
🐥 [ tweet ]
👍1
😈 [ tiraniddo, James Forshaw ]
The reason I didn't open my RCG bug last month was because MS didn't fix it correctly. As I found out before the 30 day patch soak time was up they got the remainder of the 90 days to really fix it. I guess we'll find out if they did or not soon enough😁https://t.co/YxbpQTR7La
🔗 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30150
🐥 [ tweet ]
The reason I didn't open my RCG bug last month was because MS didn't fix it correctly. As I found out before the 30 day patch soak time was up they got the remainder of the 90 days to really fix it. I guess we'll find out if they did or not soon enough😁https://t.co/YxbpQTR7La
🔗 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30150
🐥 [ tweet ]
👍1
😈 [ mariuszbit, Mariusz Banach ]
🔥Working hard on a public release of my Malware Dev CI/CD toolkit
☢️ProtectMyTooling - Multi-Packer, supporting 23+ obfuscators
☢️RedBackdoorer - PE shellcode injection via 6 techniques
☢️RedWatermarker - IOC injector for implants tracking
Already available to my sponsors 😁✨
🐥 [ tweet ]
🔥Working hard on a public release of my Malware Dev CI/CD toolkit
☢️ProtectMyTooling - Multi-Packer, supporting 23+ obfuscators
☢️RedBackdoorer - PE shellcode injection via 6 techniques
☢️RedWatermarker - IOC injector for implants tracking
Already available to my sponsors 😁✨
🐥 [ tweet ]
👍1
😈 [ 0gtweet, Grzegorz Tworek ]
A new tool has arrived! 😎
Somewhat like netstat, but with timestamps for connections!⏱
The C source code, and the compiled exe, as usual - https://t.co/dz7BOPzOpW
🔗 https://github.com/gtworek/PSBits/tree/master/NetstatWithTimestamps
🐥 [ tweet ]
A new tool has arrived! 😎
Somewhat like netstat, but with timestamps for connections!⏱
The C source code, and the compiled exe, as usual - https://t.co/dz7BOPzOpW
🔗 https://github.com/gtworek/PSBits/tree/master/NetstatWithTimestamps
🐥 [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ DirectoryRanger, DirectoryRanger ]
Post Compromise Active Directory Checklist
https://t.co/e85wblANnW
🔗 https://www.pwndefend.com/2021/09/15/post-compromise-active-directory-checklist/
🐥 [ tweet ]
Post Compromise Active Directory Checklist
https://t.co/e85wblANnW
🔗 https://www.pwndefend.com/2021/09/15/post-compromise-active-directory-checklist/
🐥 [ tweet ]
👍1
😈 [ SEKTOR7net, SEKTOR7 Institute ]
Hollowing a shell process to run a shellcode, all with just a 'dd'. Introducing DDExec by arget13
https://t.co/njGfKGSUmx
🔗 https://github.com/arget13/DDexec
🐥 [ tweet ]
Hollowing a shell process to run a shellcode, all with just a 'dd'. Introducing DDExec by arget13
https://t.co/njGfKGSUmx
🔗 https://github.com/arget13/DDexec
🐥 [ tweet ]
👍1
😈 [ FuzzySec, b33f | 🇺🇦✊ ]
This is great stuff! https://t.co/9hWHgRDu65
🔗 https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
🐥 [ tweet ][ quote ]
This is great stuff! https://t.co/9hWHgRDu65
🔗 https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
🐥 [ tweet ][ quote ]
😈 [ Tyl0us, Matt Eidelberg ]
Seeing the crazy stuff people on my team do always inspires me. In this case, I am talking about @garrfoster for coming up with this amazing DACL parser for Active Directory. This is 🔥! Check it out: https://t.co/SkkWfrVIYl #netsec #redteam
🔗 https://github.com/garrettfoster13/aced
🐥 [ tweet ]
Seeing the crazy stuff people on my team do always inspires me. In this case, I am talking about @garrfoster for coming up with this amazing DACL parser for Active Directory. This is 🔥! Check it out: https://t.co/SkkWfrVIYl #netsec #redteam
🔗 https://github.com/garrettfoster13/aced
🐥 [ tweet ]
👍1
😈 [ Six2dez1, Six2dez ]
OneListForAll repo has reached 1K stars 🥳 and I updated it just now with a few more wordlists repos, even the manually crafted for low-hanging fruits "onelistforallmicro.txt"
Also for the cryptobros I've added BTC address in the GH sponsors button 😉
https://t.co/20iNJ1vtyS
🔗 https://github.com/six2dez/OneListForAll
🐥 [ tweet ]
OneListForAll repo has reached 1K stars 🥳 and I updated it just now with a few more wordlists repos, even the manually crafted for low-hanging fruits "onelistforallmicro.txt"
Also for the cryptobros I've added BTC address in the GH sponsors button 😉
https://t.co/20iNJ1vtyS
🔗 https://github.com/six2dez/OneListForAll
🐥 [ tweet ]
👍1
😈 [ GeKarantzas, NtSetInformationProcess() ]
https://t.co/w8mz6nft5M
Our latest research covered in a colaboratibe blog post. Views expressed belong to the researchers only amd do not represent the EU or present and future employers of people involved.
@C5pider @MDSecLabs @redcode_labs @SentinelOne
🔗 https://www.sentinelone.com/blog/research-paper-emulating-phineas-phisher-attacks-in-modern-edr-environments/
🐥 [ tweet ]
https://t.co/w8mz6nft5M
Our latest research covered in a colaboratibe blog post. Views expressed belong to the researchers only amd do not represent the EU or present and future employers of people involved.
@C5pider @MDSecLabs @redcode_labs @SentinelOne
🔗 https://www.sentinelone.com/blog/research-paper-emulating-phineas-phisher-attacks-in-modern-edr-environments/
🐥 [ tweet ]
👍1
😈 [ an0n_r0, an0n ]
Sliver setup is effortless. Just tried it, currently the default config (without customization) works well against simple Defender. I think it's worth further playing. I don't think we should say goodbye to CS, but as an alternative, (not just because of this) it is promising.
🐥 [ tweet ][ quote ]
Sliver setup is effortless. Just tried it, currently the default config (without customization) works well against simple Defender. I think it's worth further playing. I don't think we should say goodbye to CS, but as an alternative, (not just because of this) it is promising.
🐥 [ tweet ][ quote ]
👍2
😈 [ BCSecurity1, BC Security ]
A wave of Malicious Doc exploits
has been released over the last year.
Our newest blog from @_Hubbl3
discusses one of the most recent attacks,#Follina, which was only just patched by @Microsoft this week.
https://t.co/HX3TxFZhJ6
🔗 https://www.bc-security.org/post/maldocs-are-evolving/
🐥 [ tweet ]
A wave of Malicious Doc exploits
has been released over the last year.
Our newest blog from @_Hubbl3
discusses one of the most recent attacks,#Follina, which was only just patched by @Microsoft this week.
https://t.co/HX3TxFZhJ6
🔗 https://www.bc-security.org/post/maldocs-are-evolving/
🐥 [ tweet ]
👍1
😈 [ ReconOne_, ReconOne ]
Do you want to focus on "Interesting" subdomains only? Try this 👆
#recontips #bugbountytips #recon #AttackSurface #subdomains #reconone
🐥 [ tweet ]
Do you want to focus on "Interesting" subdomains only? Try this 👆
#recontips #bugbountytips #recon #AttackSurface #subdomains #reconone
🐥 [ tweet ]