Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ BushidoToken, Will ]

🍻The feeling all IT workers dread: "After spending Tuesday evening drinking at a restaurant, he realised on his way home that the bag containing the drive was missing". cc @TheBeerFarmers
https://t.co/YJBHalD6L0

🔗 https://www.theguardian.com/world/2022/jun/24/japanese-city-worker-loses-usb-containing-personal-details-of-every-resident

🐥 [ tweet ]
😈 [ 0gtweet, Grzegorz Tworek ]

Want to disable the Security Event Log? Almost two years after my original research I finally had a moment to wrap it into a short video. Enjoy :) https://t.co/WnazgfXcPK

🔗 https://youtu.be/Wx7gIO71HBg

🐥 [ tweet ][ quote ]
😈 [ _Wra7h, Christian W ]

Add shellcode as a bitmap to the .rsrc section using UpdateResource before spawning as suspended. Parse the header down to the sections, skip past the bitmap shenannigans and then you get your shellcode address.

https://t.co/AoZV4CINip

🔗 https://github.com/Wra7h/PEResourceInject

🐥 [ tweet ]
😈 [ eloypgz, Eloy ]

I've playing with AWS security, and found the resources/perms enumeration tools quite limited, so developed https://t.co/D0QLCgTsvu with service filtering and recursion (e.g, automatically check S3 buckets you have access). It is still incomplete, but hope you find it useful.

🔗 https://github.com/zer1t0/awsenum

🐥 [ tweet ]
🔥1
😈 [ 0xdf_, 0xdf ]

Phoenix from @hackthebox_eu involved working around a really slow SQL injection. I'll do some reverse engineering of a WordPress plugin to figure out just the data I need. There's also compiled shell noscripts, pam modules config, and wildcard injection.

https://t.co/oAU8XOof2I

🔗 https://0xdf.gitlab.io/2022/06/25/htb-phoenix.html

🐥 [ tweet ]
😈 [ mariuszbit, Mariusz Banach ]

☢️ I'm so excited - just issued my first blog post☢️
As promised - sharing my @WarConPL slides deck on:

https://t.co/mynQW0aXsF

Power of positive feedback made me publish them during my first day of holidays (●'◡'●)

Let me know if you like it 🔥

🔗 https://mgeeky.tech/warcon-2022-modern-initial-access-and-evasion-tactics/

🐥 [ tweet ]
👍1
😈 [ NorthwaveLabs, Northwave Labs. ]

Cobalt Strike BOF foundation for kernel exploitation using CVE-2021-21551. In its current state, as a PoC, it overwrites the beacon token with the system token (privesc).

https://t.co/JR1Vao7t9c

🔗 https://github.com/NorthwaveSecurity/kernel-mii

🐥 [ tweet ]
😈 [ theluemmel, S4U2LuemmelSec ]

Oh holy Nimikätz / custom invoke-mimikatz
If you want the l33t shit for your next engagement you should:
Read -> https://t.co/ZCP5OP1M9e
Read -> https://t.co/8ulbUEyZJY
Use -> https://t.co/WNRJrDGGIz from @danielhbohannon
Use -> private tools from @ShitSecure by sponsoring him

🔗 https://s3cur3th1ssh1t.github.io/Bypass-AMSI-by-manual-modification-part-II/
🔗 https://s3cur3th1ssh1t.github.io/Building-a-custom-Mimikatz-binary/
🔗 https://github.com/danielbohannon/Invoke-Obfuscation

🐥 [ tweet ]
😈 [ mcohmi, Ohm-I (Oh My) ]

New tool drop. Introducing Dumpscan, a wrapper around volatility3 and some other stuff to make dumping certificates way easier. You can read about it here.

https://t.co/CAK4Y2QSJm

🔗 https://daddycocoaman.dev/posts/introducing-dumpscan/
🔗 https://github.com/daddycocoaman/dumpscan

🐥 [ tweet ]
😈 [ bmcder02, Blake ]

Recently I got asked to do an overview on ETW. I tried to cover everything useful for #DFIR, including multiple ways to capture ETW, useful providers and finding existing trace sessions.
#cybersecurity
https://t.co/3IWn9w6JuQ

🔗 http://bmcder.com/blog/a-begginers-all-inclusive-guide-to-etw

🐥 [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

Detect and block Credential Dumps with Defender for Endpoint & Attack Surface Reduction #DFIR
https://t.co/8BZPvX83Ij

🔗 https://jeffreyappel.nl/detect-and-block-credential-dumps-with-defender-for-endpoint-attack-surface-reduction/

🐥 [ tweet ]
😈 [ daem0nc0re, daem0nc0re ]

Added a small PoC to PrivilegedOperations project.
This PoC is to test SeShutdownPrivilege and tries to cause BSOD.

https://t.co/TYcXE9wUte

🔗 https://github.com/daem0nc0re/PrivFu/blob/main/PrivilegedOperations/SeShutdownPrivilegePoC/SeShutdownPrivilegePoC.cs

🐥 [ tweet ]
😈 [ ntlmrelay, Ring3API ]

📌Dismember tool by @liam_galvin - scan memory for secrets and more.
⚙️https://t.co/3anDqypiVb

#redteam #BlueTeam #threathunting #DFIR

🔗 https://github.com/liamg/dismember

🐥 [ tweet ]
😈 [ tiraniddo, James Forshaw ]

After @clearbluejar's post of using NtObjectManager for RPC I thought I should finish a post about how a few approaches to narrow down the enumeration to individual running processes rather than having to parse all executables on disk. https://t.co/xh22G6Ek80

🔗 https://www.tiraniddo.dev/2022/06/finding-running-rpc-server-information.html

🐥 [ tweet ]
😈 [ ORCA10K, ORCA ]

after hiding the payload in the thread denoscription, i decided to search for new places for the same purpose, so im releasing a new poc, that hide your payload in nvidia's gpu memory.
https://t.co/06mPPffWIt

🔗 https://gitlab.com/ORCA000/gp

🐥 [ tweet ]