Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ _RastaMouse, Rasta Mouse ]

I spent some of time I was glued to my chair with sweat to put rportfwd into SharpC2 as well.

🔗 https://github.com/SharpC2/SharpC2/tree/dev

🐥 [ tweet ]
😈 [ CoreAdvisories, CoreLabs Research ]

Get an in-depth analysis of recent #Windows #vulnerability, CVE-2022-22029> from cybersecurity expert and #exploit writer @ricnar456
https://t.co/i4nyYDiapH

🔗 https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-22029-windows-network-file-system-vulnerability

🐥 [ tweet ]
😈 [ HuskyHacksMK, Matt | HuskyHacks ]

Confirmed that the new Apache Spark OS Command Injection works 🎆

CVE-2022-33891 Apache Spark Shell Command Injection Vulnerability (disc. by Kostya Kortchinsky, not me)

Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1

POC soon!

🐥 [ tweet ]
😈 [ HuskyHacksMK, Matt | HuskyHacks ]

🐍My Python POC for CVE-2022-33891, Apache Spark OS Command Injection Vulnerability

hacky, slapdash, just the way I like it

Can check if a target is vuln, do a quick reverse shell, and even has an "Interactive" mode!

comes with a vuln version of Spark

https://t.co/bOXMlXYmzd

🔗 https://github.com/HuskyHacks/cve-2022-33891

🐥 [ tweet ]
😈 [ M4yFly, Mayfly ]

GOAD exploitation part5 : sAMAccountName spoofing and printNightmare.
https://t.co/F6X1HtUhCr

🔗 https://mayfly277.github.io/posts/GOADv2-pwning-part5/

🐥 [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ mpgn_x64, mpgn ]

Let's bring some 'domain admin' music to CME🥳

Soon, the blue team will hate this song ! 😂🔥

🐥 [ tweet ]
😈 [ kalilinux, Kali Linux ]

You know about our weekly images, but did you know we now have weekly VMs? Or, did you know you can use our build noscripts to automate creating your own VMs?

Check it out!

https://t.co/WKekW7dncr

🔗 https://www.kali.org/blog/kali-vm-builder-weekly/

🐥 [ tweet ]
😈 [ theluemmel, S4U2LuemmelSec ]

I am not shocked anymore :)
Confluence Questions hardcoded creds for user
CVE-2022-26138
https://t.co/2O3qt6IYee

🔗 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26138

🐥 [ tweet ]
🔥2
😈 [ fluepke, @fluepke@chaos.social ]

Discovered by a fried of mine:

CVE-2022-26138: A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group

The password is disabled1system1user6708

🐥 [ tweet ]
🔥2
😈 [ cfalta, Christoph Falta ]

I wrote something to compare the content of two volume shadow copies. Let's hope that's useful 😅 #dfir #PowerShell
https://t.co/ip15QPFaTq

🔗 https://github.com/cfalta/vsctool

🐥 [ tweet ]
😈 [ filip_dragovic, Filip Dragovic ]

Just another way to abuse SeImpersonate privilege...
https://t.co/Q175DkLnyX

Hard work is done by crisprss (dont know twitter handle) , i simply found way to weaponize it. :)

🔗 https://github.com/Wh04m1001/DiagTrackEoP

🐥 [ tweet ]
😈 [ MDSecLabs, MDSec ]

In part 1 of this blog series, @domchell provides an overview on detecting beacons https://t.co/hsTgTqQKs7

🔗 https://www.mdsec.co.uk/2022/07/part-1-how-i-met-your-beacon-overview/

🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]

[#HackTip ] When there’s not much info revealed about AD sites from CME subnets module, we can combine @_dirkjan’s adidnsdump with @pdiscoveryio mapcidr to get a nicely formatted list of the target intranetworks 🕸

#ad #dns

🐥 [ tweet ]
🔥1
😈 [ mpgn_x64, mpgn ]

Me after writing ONE vulnerablity out of 10 for the pentest report

🐥 [ tweet ]

Жиза же ну
🔥3
😈 [ mpgn_x64, mpgn ]

Don't try me 😜

🐥 [ tweet ][ quote ]
😈 [ 0xdf_, 0xdf ]

The best part of Catch from @hackthebox_eu is poisoning a config such that the server uses my VM for Redis, and serving a serialized PHP object to get RCE. There's several paths, and lots of interesting exploitation.

https://t.co/hRViK12SW6

🔗 https://0xdf.gitlab.io/2022/07/23/htb-catch.html

🐥 [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Self-removing PE's with Remote Thread Injection
https://t.co/wSBqhFOl5b

🔗 http://0xthem.blogspot.com/2014/10/self-delete-pe.html

🐥 [ tweet ]
😈 [ itm4n, Clément Labro ]

The July 2022 update of Windows 10/11 killed PPLdump 💀😢

Find out how in this blog post...
👉 https://t.co/o0izvkkSm0

🔗 https://itm4n.github.io/the-end-of-ppldump/

🐥 [ tweet ]
😈 [ cube0x0, Cube0x0 ]

When you spend 2-months of your private time writing a full-featured C2 framework including C++ GUI, Backend, and a C++ PIC agent with custom functions only to end up clueless about what to do with it

🐥 [ tweet ]
😈 [ s4tan, Antonio 's4tan' Parata ]

With the intent to be more transparent, I decided to release the source code of my C2 framework. Don't be evil :) https://t.co/xgbUxkX5Nl

🔗 https://github.com/enkomio/AlanFramework

🐥 [ tweet ]