😈 [ 80vul, heige ]
DeimosC2 https://t.co/iful3m4ErI DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that have been compromised. D https://t.co/XfMPOwkr0o #ZoomEye Dork
🔗 https://github.com/DeimosC2/DeimosC2
🔗 https://www.zoomeye.org/searchResult?q=%22%3Cnoscript%3EDeimos%20C2%3C%2Fnoscript%3E%22
🐥 [ tweet ]
DeimosC2 https://t.co/iful3m4ErI DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that have been compromised. D https://t.co/XfMPOwkr0o #ZoomEye Dork
🔗 https://github.com/DeimosC2/DeimosC2
🔗 https://www.zoomeye.org/searchResult?q=%22%3Cnoscript%3EDeimos%20C2%3C%2Fnoscript%3E%22
🐥 [ tweet ]
😈 [ cnotin, Clément Notin ]
Just noticed that the amazing "Remediation And Hardening Strategies For Microsoft 365 To Defend Against UNC2452" @Mandiant whitepaper has a version 1.2 with two additional techniques from version 1.1
📜https://t.co/4WhQTixrxE
Awesome reference on #AzureAD, #M365, #ADFS security
🔗 https://www.mandiant.com/sites/default/files/2021-11/wp-m-unc2452-000343.pdf
🐥 [ tweet ]
Just noticed that the amazing "Remediation And Hardening Strategies For Microsoft 365 To Defend Against UNC2452" @Mandiant whitepaper has a version 1.2 with two additional techniques from version 1.1
📜https://t.co/4WhQTixrxE
Awesome reference on #AzureAD, #M365, #ADFS security
🔗 https://www.mandiant.com/sites/default/files/2021-11/wp-m-unc2452-000343.pdf
🐥 [ tweet ]
😈 [ LittleJoeTables, Moloch ]
Offline implant builds now supported out of the box in Sliver thanks to @capnspacehook
https://t.co/5MjdULcdXc
🔗 https://github.com/BishopFox/sliver/releases/tag/v1.5.21
🐥 [ tweet ]
Offline implant builds now supported out of the box in Sliver thanks to @capnspacehook
https://t.co/5MjdULcdXc
🔗 https://github.com/BishopFox/sliver/releases/tag/v1.5.21
🐥 [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]
Public Cloud Services Comparison
https://t.co/JNYNTXm5O7
🔗 https://comparecloud.in/
🐥 [ tweet ]
Public Cloud Services Comparison
https://t.co/JNYNTXm5O7
🔗 https://comparecloud.in/
🐥 [ tweet ]
😈 [ OscarAkaElvis, Óscar Alfonso Díaz ]
If you are interested in Binance data analysis, take a look to this awesome lib: https://t.co/uDftIcv5Cc
#binance #pandas #python3
🔗 https://github.com/nand0san/binpan_studio
🐥 [ tweet ]
If you are interested in Binance data analysis, take a look to this awesome lib: https://t.co/uDftIcv5Cc
#binance #pandas #python3
🔗 https://github.com/nand0san/binpan_studio
🐥 [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]
Another AMSI bypass alternative, usable from for example C++/C/Nim binaries as amsi.dll is not loaded there by default:
https://t.co/4isRAszjLC
🔗 https://waawaa.github.io/es/amsi_bypass-hooking-NtCreateSection/
🐥 [ tweet ]
Another AMSI bypass alternative, usable from for example C++/C/Nim binaries as amsi.dll is not loaded there by default:
https://t.co/4isRAszjLC
🔗 https://waawaa.github.io/es/amsi_bypass-hooking-NtCreateSection/
🐥 [ tweet ]
😈 [ FuzzySec, b33f ]
Write your Own Virtual Machine - https://t.co/uxU72UacRN
🔗 https://www.jmeiners.com/lc3-vm/
🐥 [ tweet ]
Write your Own Virtual Machine - https://t.co/uxU72UacRN
🔗 https://www.jmeiners.com/lc3-vm/
🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]
🧵(1/3) I get so excited every time I contribute to #impacket 🤗 Anyways, here’s an upcoming update to secretsdump[.]py ↪️ There’s now this -ldapfilter option that allows an attacker to #DCSync a bunch of user with a single shot 🧨
https://t.co/4ASCbqysj8
🔗 https://github.com/SecureAuthCorp/impacket/pull/1329
🐥 [ tweet ]
🧵(1/3) I get so excited every time I contribute to #impacket 🤗 Anyways, here’s an upcoming update to secretsdump[.]py ↪️ There’s now this -ldapfilter option that allows an attacker to #DCSync a bunch of user with a single shot 🧨
https://t.co/4ASCbqysj8
🔗 https://github.com/SecureAuthCorp/impacket/pull/1329
🐥 [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ x86matthew, x86matthew ]
EmbedExeReg - Embedding an EXE inside a .REG file with automatic execution
Create a .reg file containing a hidden payload
https://t.co/4hPKoFWCk0
🔗 https://www.x86matthew.com/view_post?id=embed_exe_reg
🐥 [ tweet ]
EmbedExeReg - Embedding an EXE inside a .REG file with automatic execution
Create a .reg file containing a hidden payload
https://t.co/4hPKoFWCk0
🔗 https://www.x86matthew.com/view_post?id=embed_exe_reg
🐥 [ tweet ]
😈 [ metasploit, Metasploit Project ]
A new LDAP Query module! 🦾
https://t.co/payirwnUQf
🔗 https://youtu.be/yYlwZwhycwE
🐥 [ tweet ]
A new LDAP Query module! 🦾
https://t.co/payirwnUQf
🔗 https://youtu.be/yYlwZwhycwE
🐥 [ tweet ]
😈 [ ReconOne_, ReconOne ]
Have you ever looked for Open Redirects? Try this 👇 💣
#recontips #AttackSurface #bugbountytips #bugbounty #openredirect #recon #httpx
🐥 [ tweet ]
Have you ever looked for Open Redirects? Try this 👇 💣
#recontips #AttackSurface #bugbountytips #bugbounty #openredirect #recon #httpx
🐥 [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ dekel_paz, Dekel Paz ]
Uploaded a new noscript that adds vulnerabilities to #BloodHound by parsing scanner reports. Now you can search for vulnerable hosts in your network with paths to Domain Admins!
https://t.co/voN11IR3NL
P.S. did you catch the upcoming #BlueHound spoiler at the end?
@ZeroNetworks
🔗 https://github.com/zeronetworks/BloodHound-Tools/tree/main/VulnerabilitiesDataImport
🐥 [ tweet ]
Uploaded a new noscript that adds vulnerabilities to #BloodHound by parsing scanner reports. Now you can search for vulnerable hosts in your network with paths to Domain Admins!
https://t.co/voN11IR3NL
P.S. did you catch the upcoming #BlueHound spoiler at the end?
@ZeroNetworks
🔗 https://github.com/zeronetworks/BloodHound-Tools/tree/main/VulnerabilitiesDataImport
🐥 [ tweet ]
😈 [ Six2dez1, Six2dez ]
My mate @cybersecivan has released a small golang utility to grab the latest trending CVE's from @CVEtrends to easily pipe in your workflow 🔥
Check it out!
https://t.co/6VlyN8ihxW
🔗 https://github.com/tr3ss/gofetch
🐥 [ tweet ]
My mate @cybersecivan has released a small golang utility to grab the latest trending CVE's from @CVEtrends to easily pipe in your workflow 🔥
Check it out!
https://t.co/6VlyN8ihxW
🔗 https://github.com/tr3ss/gofetch
🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]
🧵 (1/x) Reanimating ADCSPwn thread (in a simple way) ⏬
You all know this great tool by @_batsec_, but unfortunately Microsoft broke it with one of those anti-PetitPotam patches a while ago ⏬
https://t.co/LeYa5s5sfv
#lpe #adcs #petitpotam #webdav
🔗 https://github.com/bats3c/ADCSPwn/issues/3#issuecomment-901713533
🐥 [ tweet ]
🧵 (1/x) Reanimating ADCSPwn thread (in a simple way) ⏬
You all know this great tool by @_batsec_, but unfortunately Microsoft broke it with one of those anti-PetitPotam patches a while ago ⏬
https://t.co/LeYa5s5sfv
#lpe #adcs #petitpotam #webdav
🔗 https://github.com/bats3c/ADCSPwn/issues/3#issuecomment-901713533
🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]
🧵 (3/x) But guess what, there’s another super cool tool – Coercer (by @podalirius_) – which can be used to trigger the authentication with a different API that is not affected by the ad-hoc check provided in the patch ⏬
🐥 [ tweet ]
🧵 (3/x) But guess what, there’s another super cool tool – Coercer (by @podalirius_) – which can be used to trigger the authentication with a different API that is not affected by the ad-hoc check provided in the patch ⏬
🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]
🧵 (4/x) And now *tada* I can get my machine account certificate on a fully patched Windows 10 ⏬
🐥 [ tweet ]
🧵 (4/x) And now *tada* I can get my machine account certificate on a fully patched Windows 10 ⏬
🐥 [ tweet ]