π [ Florian Roth @cyb3rops ]
I'm still collecting funny issues on offsec tools on Github
If you find more, send them my way and I'll create a Github repo so we can collect them together for the lulz
π https://neo23x0.github.io/LOLSecIssues/
π₯ [ tweet ]
I'm still collecting funny issues on offsec tools on Github
If you find more, send them my way and I'll create a Github repo so we can collect them together for the lulz
π https://neo23x0.github.io/LOLSecIssues/
π₯ [ tweet ]
π8
π [ assume_breach @assume_breach ]
Getting a beacon from the DC using a raw Havoc shellcode file from a network shared folder. Tool is in my repo.
π https://github.com/assume-breach/Home-Grown-Red-Team.git
π₯ [ tweet ]
Getting a beacon from the DC using a raw Havoc shellcode file from a network shared folder. Tool is in my repo.
π https://github.com/assume-breach/Home-Grown-Red-Team.git
π₯ [ tweet ]
π5
π [ Panagiotis Chartas @t3l3machus ]
For your #redteam enumeration and brute forcing needs, use babelstrike to transliterate and generate usernames from full names in various non-English languages (common issue from scraped employee data) π Currently, it covers Greek, Hindi, Spanish, French, Polish, and Hungarian:
π https://github.com/t3l3machus/BabelStrike
Combine it with #psudohash, a password list generator that imitates password creation patterns commonly used by humans, like substituting a word's letters with symbols or numbers (leet), using char-case variations, adding a common padding before or after the main passphrase and more:
π https://github.com/t3l3machus/psudohash
π₯ [ tweet ]
For your #redteam enumeration and brute forcing needs, use babelstrike to transliterate and generate usernames from full names in various non-English languages (common issue from scraped employee data) π Currently, it covers Greek, Hindi, Spanish, French, Polish, and Hungarian:
π https://github.com/t3l3machus/BabelStrike
Combine it with #psudohash, a password list generator that imitates password creation patterns commonly used by humans, like substituting a word's letters with symbols or numbers (leet), using char-case variations, adding a common padding before or after the main passphrase and more:
π https://github.com/t3l3machus/psudohash
π₯ [ tweet ]
π [ SkelSec @SkelSec ]
Due to a gentle nudge from @michael_eder_ I have uploaded my pysnaffler project to Github and to pyp.
(did you know that you can sponsor me on github?)
Anyways, enjoy!
π https://github.com/skelsec/pysnaffler
π₯ [ tweet ]
Due to a gentle nudge from @michael_eder_ I have uploaded my pysnaffler project to Github and to pyp.
(did you know that you can sponsor me on github?)
Anyways, enjoy!
π https://github.com/skelsec/pysnaffler
π₯ [ tweet ]
π [ Diego Capriotti @naksyn ]
Here's Process Stomping injection and how you can use it in a Mockingjay-ish way to load a Beacon on a exe's RWX section using sRDI. Check it out!
Blog:
π https://www.naksyn.com/edr%20evasion/2023/11/18/mockingjay-revisited-process-stomping-srdi-beacon.html
Tool:
π https://github.com/naksyn/ProcessStomping
Thanks to @hasherezade and @monoxgas for their awesome work
π₯ [ tweet ]
Here's Process Stomping injection and how you can use it in a Mockingjay-ish way to load a Beacon on a exe's RWX section using sRDI. Check it out!
Blog:
π https://www.naksyn.com/edr%20evasion/2023/11/18/mockingjay-revisited-process-stomping-srdi-beacon.html
Tool:
π https://github.com/naksyn/ProcessStomping
Thanks to @hasherezade and @monoxgas for their awesome work
π₯ [ tweet ]
π₯3
This media is not supported in your browser
VIEW IN TELEGRAM
π [ Arris Huijgen @bitsadmin ]
#LOFLCAB highlight: Ssms.exe
Using SQL Server Management Studio with Kerberos authentication to obtain command execution on the SQL server using the xp_cmdshell stored procedure.
Details:
π https://lofl-project.github.io/loflcab/Binaries/Ssms/
Full quality video:
π https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-3#sql-server
π₯ [ tweet ][ quote ]
#LOFLCAB highlight: Ssms.exe
Using SQL Server Management Studio with Kerberos authentication to obtain command execution on the SQL server using the xp_cmdshell stored procedure.
Details:
π https://lofl-project.github.io/loflcab/Binaries/Ssms/
Full quality video:
π https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-3#sql-server
π₯ [ tweet ][ quote ]
π₯3
π [ Adam Svoboda @adamsvoboda ]
Ever find yourself on an endpoint with SentinelOne and have Local Admin? Just ask SentinelAgent.exe nicely, and it will dump a process for you, including itself!
It bombs out on LSASS, but most other processes work.
π https://gist.github.com/adamsvoboda/8e248c6b7fb812af5d04daba141c867e
Unable to dump LSASS using the previous script? No problem, just ask S1 for a Live Kernel Dump instead! You can open this in windbg (and use mimilib.dll) and go from there.
π https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80
π₯ [ tweet ][ quote ]
Ever find yourself on an endpoint with SentinelOne and have Local Admin? Just ask SentinelAgent.exe nicely, and it will dump a process for you, including itself!
It bombs out on LSASS, but most other processes work.
π https://gist.github.com/adamsvoboda/8e248c6b7fb812af5d04daba141c867e
Unable to dump LSASS using the previous script? No problem, just ask S1 for a Live Kernel Dump instead! You can open this in windbg (and use mimilib.dll) and go from there.
π https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80
π₯ [ tweet ][ quote ]
π4
Offensive Xwitter
π [ Adam Svoboda @adamsvoboda ] Ever find yourself on an endpoint with SentinelOne and have Local Admin? Just ask SentinelAgent.exe nicely, and it will dump a process for you, including itself! It bombs out on LSASS, but most other processes work. π htβ¦
π [ D4rthMaulCop @D4rthMaulCop ]
@adamsvoboda Awesome! I wrote a quick C# port too!
π https://github.com/D4rthMaulCop/DumpKernel-S1
π₯ [ tweet ]
@adamsvoboda Awesome! I wrote a quick C# port too!
π https://github.com/D4rthMaulCop/DumpKernel-S1
π₯ [ tweet ]
π3
π [ HackerRalf @hacker_ralf ]
Everyone takes a lot from the community... it's time to give something back yourself.
Kerbeus - BOF implementation of Rubeus (not all).
π https://github.com/RalfHacker/Kerbeus-BOF
P. S. PM me about all bugs
#redteam #kerberos #havoc #cobaltstrike #bof
π₯ [ tweet ]
Everyone takes a lot from the community... it's time to give something back yourself.
Kerbeus - BOF implementation of Rubeus (not all).
π https://github.com/RalfHacker/Kerbeus-BOF
P. S. PM me about all bugs
#redteam #kerberos #havoc #cobaltstrike #bof
π₯ [ tweet ]
π10
π [ hermit @ackmage ]
hi, check out this tool for easy Linux kernel building and debugging - easylkb
worked on it together with @netspooky! π
writeup:
π https://tmpout.sh/3/20.html
repo:
π https://github.com/deepseagirl/easylkb
π₯ [ tweet ]
hi, check out this tool for easy Linux kernel building and debugging - easylkb
worked on it together with @netspooky! π
writeup:
π https://tmpout.sh/3/20.html
repo:
π https://github.com/deepseagirl/easylkb
π₯ [ tweet ]
π4
π [ Synacktiv @Synacktiv ]
Unlock the Global Admin access π on Azure with this pentesting mindmap made by @alexisdanizan!
π https://github.com/synacktiv/Mindmaps
π₯ [ tweet ]
Unlock the Global Admin access π on Azure with this pentesting mindmap made by @alexisdanizan!
π https://github.com/synacktiv/Mindmaps
π₯ [ tweet ]
π₯1
π [ OtterHacker @OtterHacker ]
Finally π€© I got a PIC code for my #beacon! It was a really nice journey and a lot of things have been learnt on the way. If you want to try it too, I found this blog by @winternl_t really interesting:
π https://winternl.com/shellcodestdio/
And as usual, the @C5pider #Havoc β€οΈ
π₯ [ tweet ]
Finally π€© I got a PIC code for my #beacon! It was a really nice journey and a lot of things have been learnt on the way. If you want to try it too, I found this blog by @winternl_t really interesting:
π https://winternl.com/shellcodestdio/
And as usual, the @C5pider #Havoc β€οΈ
π₯ [ tweet ]
π₯2
π [ soka @pentest_soka ]
I just released a blogpost where I describe how two open source tools can be easily converted to Reflective DLL to be loaded in memory with Cobalt Strike.
This post comes along with which exists thanks to @Prepouce_ work
π https://sokarepo.github.io/redteam/2023/10/11/create-reflective-dll-for-cobaltstrike.html
π https://github.com/sokaRepo/CoercedPotatoRDLL
π₯ [ tweet ]
I just released a blogpost where I describe how two open source tools can be easily converted to Reflective DLL to be loaded in memory with Cobalt Strike.
This post comes along with which exists thanks to @Prepouce_ work
π https://sokarepo.github.io/redteam/2023/10/11/create-reflective-dll-for-cobaltstrike.html
π https://github.com/sokaRepo/CoercedPotatoRDLL
π₯ [ tweet ]
π₯3
π [ π π π π π π @felixm_pw ]
Indisputable C2 tier list
π₯ [ tweet ]
Indisputable C2 tier list
π₯ [ tweet ]
ΠΊΡΠΈΠ½ΠΆ ΠΈΠ»ΠΈ ΡΠΎΡΠ»?π15
π [ SAINTCON @SAINTCON ]
Lee Christensen, Will Schroeder, and Maxwell Harley - Fighting Data With Data
Detailing the various red team challenges regarding data, leading into how this influenced Nemesisβ architectural decisions and design.
π https://youtu.be/0q9u2hDcpIo
π₯ [ tweet ]
Lee Christensen, Will Schroeder, and Maxwell Harley - Fighting Data With Data
Detailing the various red team challenges regarding data, leading into how this influenced Nemesisβ architectural decisions and design.
π https://youtu.be/0q9u2hDcpIo
π₯ [ tweet ]
π₯1