Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ Antonio Cocomazzi @splinter_code ]

Do you want to start the RemoteRegistry service without Admin privileges?
Just write into the "winreg" named pipe πŸ‘†

πŸ₯ [ tweet ]
🀯13😁1
😈 [ Tony Gore @nullg0re ]

Dcsync without triggering traditional alerts?

πŸ”— https://nullg0re.com/2023/09/hijacking-someone-else-dcsync/

πŸ₯ [ tweet ]
😈 [ Kleiton Kurti @kleiton0x7e ]

Spent some time reversing undocumented Syscalls residing in Kernel32/Ntdll and created a PoC for proxying DLL loads. This leads to a clean call stack as the return address pointing to shellcode won't be pushed to stack.

#CyberSecurity #redteam #infosec

πŸ”— https://github.com/kleiton0x00/Proxy-DLL-Loads

πŸ₯ [ tweet ]
πŸ‘4πŸ”₯1
😈 [ spencer @techspence ]

A .net port of @ZeroMemoryEx AMSI Killer with an added feature to continuously patch new powershell processes by @S1lky_1337

πŸ”— https://github.com/S1lkys/SharpKiller
πŸ”— https://github.com/ZeroMemoryEx/Amsi-Killer

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ N1k0la @webdxg ]

Exchange Server CVE-2023-36745

Standing on the Shoulder of Giants @chudyPB

πŸ”— https://n1k0la-t.github.io/2023/10/24/Microsoft-Exchange-Server-CVE-2023-36745/

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ Mayfly @M4yFly ]

A new Lab 🏰 is available on GOAD: NHA.
This time it is a challenge, 5 vms, you start with no account and try to get domain admin on the two domains.

Have fun !

πŸ”— https://github.com/Orange-Cyberdefense/GOAD/tree/main/ad/NHA

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ Garrett @garrfoster ]

Pushed an update to SCCMHunter to include @SkelSec's python unobfuscator for @_xpn_'s sccmwtf NAA attack. Shout out to you both for the awesome work!

πŸ”— https://github.com/garrettfoster13/sccmhunter
πŸ”— https://github.com/xpn/sccmwtf/blob/main/policysecretunobfuscate.py

πŸ₯ [ tweet ]
πŸ‘4πŸ”₯1
😈 [ Justin Elze @HackingLZ ]

wmiexec is so reliable with so many great detections avaliable. Cortex does a really good job without of the box Impacket as well.

πŸ”— https://www.crowdstrike.com/blog/how-to-detect-and-prevent-impackets-wmiexec/
πŸ”— https://micahbabinski.medium.com/brace-for-impacket-5191dff82c74

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ Bo0oM @i_bo0om ]

A photo of my burp suite key

πŸ₯ [ tweet ]

#burp #suite #professional #license #key #file #crack #download
😁14πŸ₯±5πŸ”₯3
😈 [ Benjamin Watson @nebshell ]

This is nice

πŸ”— https://x64.syscall.sh/

πŸ₯ [ tweet ]
πŸ”₯3πŸ‘1
😈 [ Chris Au @netero_1010 ]

Made a tool to create/modify schedule task using just registry keys. It has some requirements (require SYSTEM) but the beauty of it is it wont generate schedule task creation event log.

πŸ”— https://github.com/netero1010/GhostTask

πŸ₯ [ tweet ]
πŸ”₯4πŸ‘2πŸ₯±1
😈 [ Fabian @testert01 ]

[Blogpost] EvtPsst a small EventLog Process Mute tool without OpenProcess call to the EventLog process.

This blog shows how to elevate a SYNCHRONIZE handle to a full process handle with a process token of EventLog.

πŸ”— https://nothingspecialforu.github.io/EvtPsstBlog/

πŸ₯ [ tweet ]
πŸ”₯3πŸ‘2
😈 [ Corben Leo @hacker_ ]

I've made $500k+ from #SSRF vulnerabilities.

Here are my tricks:

πŸ”— https://threadreaderapp.com/thread/1694554700555981176.html

πŸ₯ [ tweet ]
πŸ‘5
😈 [ Matthew @embee_research ]

Unpacking .NET Malware Using Process Hacker and Dnspy.

An easy method to obtain unpacked .NET samples by leveraging Process Hacker to identify suspicious modules, and Dnspy to save them from memory.

πŸ”— https://embee-research.ghost.io/unpacking-net-malware-with-process-hacker/

πŸ₯ [ tweet ]
πŸ‘3
😈 [ n00py @n00py1 ]

The craziest BloodHound art I've made yet (password sharing clusters)

πŸ₯ [ tweet ]

ΠΏΠ»Π°Π³ΠΈΠ°Ρ‚ - ΠΎΡ‡Π΅Π²ΠΈΠ΄Π½ΠΎ ΠΆΠ΅, Ρ‡Ρ‚ΠΎ это Волосатый Π±ΡƒΠ±Π»ΠΈΠΊ
πŸ”₯6