Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ V❄️ @vincenzosantuc1 ]

What's better for Christmas than a nice read about Reflective DLL Injection? πŸŽ„

πŸ”— https://oldboy21.github.io/posts/2023/12/all-i-want-for-christmas-is-reflective-dll-injection/

#reflectivedll #oldbutgold #cplusplus #code #belloblog

πŸ₯ [ tweet ]
πŸ‘5😁2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Alex neff @al3x_n3ff ]

A small gift: NetExec now supports Tab-Completion 🎁
Made by @Adamkadaban

Merry Christmas!πŸŽ„

πŸ₯ [ tweet ]
πŸ”₯10πŸ₯±1
😈 [ Ido Veltzman @Idov31 ]

There was no update for a while and the reason being a massive bug fixes, feature checking and a new feature (fun fact: it is the 23th feature!).
Now, you can use Nidhogg to dump credentials from LSASS!
Go check it out:

πŸ”— https://github.com/Idov31/Nidhogg/tree/dev

#infosec #CyberSecurity

πŸ₯ [ tweet ]
πŸ‘3😁3
😈 [ bohops @bohops ]

I guess all Microsoft signed debuggers and tracers are execute lolbins by nature, so here is another:

dotnet-trace.exe collect -- <cmd arg...>


If the process is not a .net program, dotnet-trace will kill the direct child process after a few seconds.

πŸ₯ [ tweet ]
πŸ”₯7πŸ‘1
😈 [ an0n @an0n_r0 ]

OST cannot be stopped. Here is a technique we tested internally 9 months ago: blocking EDR telemetry by leveraging the Windows Filtering Platform. Considered it so evil that we didn't publish it that time. It was pointless, now here it is by @netero_1010:

πŸ”— https://github.com/netero1010/EDRSilencer

πŸ₯ [ tweet ]
πŸ”₯2
πŸŽ„πŸŽ„πŸŽ„
πŸ”₯13😁1
😈 [ hackerfantastic.x @hackerfantastic ]

4 new releases from @myhackerhouse for your malware development and analysis purposes with 3 re-created from the CIA's Vault7 leak:

πŸ”— https://github.com/hackerhouse-opensource/marble
πŸ”— https://github.com/hackerhouse-opensource/WMIProcessWatcher
πŸ”— https://github.com/hackerhouse-opensource/Artillery
πŸ”— https://github.com/hackerhouse-opensource/SignToolEx

Happy New Year & Enjoy 2024!πŸŽ‡

πŸ₯ [ tweet ]
πŸ‘4
ΠœΡ‹ с Π²Π΄ΠΎΠ²ΠΎΠΉ Клико поздравляСм всСх с ΠΠ°ΡΡ‚ΡƒΠΏΠ°ΡŽΡ‰ΠΈΠΌ! Π£ мСня Π½Π΅Ρ‚ ΠΌΠΎΠ΄Π½ΠΎΠΉ статы с TGStat, Π½ΠΎ ΠΈ Ρ‚Π°ΠΊ Π²ΠΈΠ΄Π½ΠΎ, Ρ‡Ρ‚ΠΎ ΠΊΠ°Π½Π°Π» развивался ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΈΠ²Π½ΠΎ (всСх обнял). Π”Π°Π»ΡŒΡˆΠ΅ – большС, stay tuned πŸŽ„ 🍾
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯33πŸ‘5😁2πŸ€”1
😈 [ NULL @NUL0x4C ]

Publishing a PoC for an interesting code injection technique

πŸ”— https://github.com/Maldev-Academy/Christmas

πŸ₯ [ tweet ]
πŸ‘5
😈 [ modexp @modexpblog ]

Compression using undocumented RDP API. Code is a bit rough. Might interest you @0gtweet as there are potentially other ways to do it. e.g. COM

πŸ”— https://gist.github.com/odzhan/56eb105a611dcdebd1d3a084c7312190

πŸ₯ [ tweet ]
πŸ”₯4πŸ₯±1
😈 [ Matt Hand @matterpreter ]

Windows is a meme. I've spent the better part of the afternoon wondering why my code isn't working. Turns out this has been known since at least 2021...

πŸ”— https://dennisbabkin.com/blog/?t=when-developers-give-up-deletesecuritypackage-function

πŸ₯ [ tweet ]

Directed by Robert B. Weide
😁14πŸ₯±1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯10πŸ‘1
😈 [ p4p1 @p4p1_wt7 ]

Happy New Year all, New module on the #havocframework store to work with Bloodhound CE. Automatically call your SharpHound.exe and upload your .json files directly from the havoc interface!

πŸ”— https://github.com/p4p1/havoc-bloodhound
πŸ”— https://p4p1.github.io/havoc-store/

πŸ₯ [ tweet ]
πŸ‘5
😈 [ Cas van Cooten @chvancooten ]

GPT-4-Vision was trained not to solve Captcha prompts... But this is easy to circumvent with the ol' Grandma exploit πŸ˜‚

πŸ₯ [ tweet ]
😁14πŸ‘1πŸ€”1
😈 [ SchrodingersAV @SchrodingersAV ]

Read about a technique involving tampering with scheduled tasks, and was inspired to build a powershell script to edit scheduled tasks via the registry keys.
Can be used in memory with powershell!
#redteam #cybersecurity #hacking

πŸ”— https://gist.github.com/Workingdaturah/991de2d176b4b8c8bafd29cc957e20c2

πŸ₯ [ tweet ]
πŸ”₯3πŸ‘1
😈 [ Joshua Rogers @MegaManSec ]

Today I am proud to be officially releasing a tool I've been working on recently: SSH-Snake.

A self-replicating and self-propagating -- completely fileless -- ssh-based worm that discovers ssh private keys and destinations. Make cool graphs, too!

πŸ”— https://github.com/MegaManSec/SSH-Snake

πŸ₯ [ tweet ]
πŸ‘13