Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ bohops @bohops ]

I guess all Microsoft signed debuggers and tracers are execute lolbins by nature, so here is another:

dotnet-trace.exe collect -- <cmd arg...>


If the process is not a .net program, dotnet-trace will kill the direct child process after a few seconds.

πŸ₯ [ tweet ]
πŸ”₯7πŸ‘1
😈 [ an0n @an0n_r0 ]

OST cannot be stopped. Here is a technique we tested internally 9 months ago: blocking EDR telemetry by leveraging the Windows Filtering Platform. Considered it so evil that we didn't publish it that time. It was pointless, now here it is by @netero_1010:

πŸ”— https://github.com/netero1010/EDRSilencer

πŸ₯ [ tweet ]
πŸ”₯2
πŸŽ„πŸŽ„πŸŽ„
πŸ”₯13😁1
😈 [ hackerfantastic.x @hackerfantastic ]

4 new releases from @myhackerhouse for your malware development and analysis purposes with 3 re-created from the CIA's Vault7 leak:

πŸ”— https://github.com/hackerhouse-opensource/marble
πŸ”— https://github.com/hackerhouse-opensource/WMIProcessWatcher
πŸ”— https://github.com/hackerhouse-opensource/Artillery
πŸ”— https://github.com/hackerhouse-opensource/SignToolEx

Happy New Year & Enjoy 2024!πŸŽ‡

πŸ₯ [ tweet ]
πŸ‘4
ΠœΡ‹ с Π²Π΄ΠΎΠ²ΠΎΠΉ Клико поздравляСм всСх с ΠΠ°ΡΡ‚ΡƒΠΏΠ°ΡŽΡ‰ΠΈΠΌ! Π£ мСня Π½Π΅Ρ‚ ΠΌΠΎΠ΄Π½ΠΎΠΉ статы с TGStat, Π½ΠΎ ΠΈ Ρ‚Π°ΠΊ Π²ΠΈΠ΄Π½ΠΎ, Ρ‡Ρ‚ΠΎ ΠΊΠ°Π½Π°Π» развивался ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΈΠ²Π½ΠΎ (всСх обнял). Π”Π°Π»ΡŒΡˆΠ΅ – большС, stay tuned πŸŽ„ 🍾
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯33πŸ‘5😁2πŸ€”1
😈 [ NULL @NUL0x4C ]

Publishing a PoC for an interesting code injection technique

πŸ”— https://github.com/Maldev-Academy/Christmas

πŸ₯ [ tweet ]
πŸ‘5
😈 [ modexp @modexpblog ]

Compression using undocumented RDP API. Code is a bit rough. Might interest you @0gtweet as there are potentially other ways to do it. e.g. COM

πŸ”— https://gist.github.com/odzhan/56eb105a611dcdebd1d3a084c7312190

πŸ₯ [ tweet ]
πŸ”₯4πŸ₯±1
😈 [ Matt Hand @matterpreter ]

Windows is a meme. I've spent the better part of the afternoon wondering why my code isn't working. Turns out this has been known since at least 2021...

πŸ”— https://dennisbabkin.com/blog/?t=when-developers-give-up-deletesecuritypackage-function

πŸ₯ [ tweet ]

Directed by Robert B. Weide
😁14πŸ₯±1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯10πŸ‘1
😈 [ p4p1 @p4p1_wt7 ]

Happy New Year all, New module on the #havocframework store to work with Bloodhound CE. Automatically call your SharpHound.exe and upload your .json files directly from the havoc interface!

πŸ”— https://github.com/p4p1/havoc-bloodhound
πŸ”— https://p4p1.github.io/havoc-store/

πŸ₯ [ tweet ]
πŸ‘5
😈 [ Cas van Cooten @chvancooten ]

GPT-4-Vision was trained not to solve Captcha prompts... But this is easy to circumvent with the ol' Grandma exploit πŸ˜‚

πŸ₯ [ tweet ]
😁14πŸ‘1πŸ€”1
😈 [ SchrodingersAV @SchrodingersAV ]

Read about a technique involving tampering with scheduled tasks, and was inspired to build a powershell script to edit scheduled tasks via the registry keys.
Can be used in memory with powershell!
#redteam #cybersecurity #hacking

πŸ”— https://gist.github.com/Workingdaturah/991de2d176b4b8c8bafd29cc957e20c2

πŸ₯ [ tweet ]
πŸ”₯3πŸ‘1
😈 [ Joshua Rogers @MegaManSec ]

Today I am proud to be officially releasing a tool I've been working on recently: SSH-Snake.

A self-replicating and self-propagating -- completely fileless -- ssh-based worm that discovers ssh private keys and destinations. Make cool graphs, too!

πŸ”— https://github.com/MegaManSec/SSH-Snake

πŸ₯ [ tweet ]
πŸ‘13
😈 [ BlackArrow @BlackArrowSec ]

Our colleague @IagoAbad has weaponized the leaked token handles technique for MSSQL.

Now open token handles in MSSQL's process (sqlservr.exe) can be abused to change security context and escalate privileges both locally and in the domain.

πŸ”— https://github.com/blackarrowsec/Handly

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ Rasta Mouse @_RastaMouse ]

[BLOG]
First post of 2024. Why, as a C# dev, you should use SafeHandle classes instead of IntPtr's.

πŸ”— https://rastamouse.me/safehandle-vs-intptr/

πŸ₯ [ tweet ]
πŸ”₯4πŸ‘2πŸ€”1
😈 [ Grzegorz Tworek @0gtweet ]

Token stealing (aka duplication) with syscalls only? Not sure if it’s novel approach but had to try anyway. πŸ€·β€β™‚οΈ
NtOpenProcessToken, NtAdjustPrivilegesToken, NtOpenProcess, NtDuplicateToken, and NtSetInformationThread at your service! Enjoy the C code:

πŸ”— https://github.com/gtworek/PSBits/blob/master/Misc/TokenStealWithSyscalls.c

πŸ₯ [ tweet ]
πŸ‘5πŸ”₯1