Offensive Xwitter
19.3K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ EvilMog @Evil_Mog ]

4 billion if statements:

πŸ”— https://andreasjhkarlsson.github.io//jekyll/update/2023/12/27/4-billion-if-statements.html

πŸ₯ [ tweet ]

смСшнявка Π½Π° этот Π²Π΅Ρ‡Π΅Ρ€ пятницы
😁7πŸ‘4🀯1πŸ₯±1
😈 [ zhassulan zhussupov @cocomelonckz ]

next one. Since I’m a little busy writing my book for the Packt, I haven’t been writing as often lately. But I’m still working on researching and simulating ransomware.

πŸ”— https://cocomelonc.github.io/malware/2024/01/16/malware-cryptography-24.html

πŸ₯ [ tweet ]
πŸ”₯4😒1
😈 [ Octoberfest7 @Octoberfest73 ]

I'm exited to release GraphStrike, a project I completed during my internship at @RedSiege. Route all of your Cobalt Strike HTTPS traffic through graph.microsoft.com.

Tool:
πŸ”— https://github.com/RedSiege/GraphStrike?tab=readme-ov-file

Dev blog:
πŸ”— https://redsiege.com/blog/2024/01/graphstrike-developer

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ Kleiton Kurti @kleiton0x7e ]

Created a PoC for loading DLLs without LoadLibraryA. Instead we'll leverage the VEH (Vectored Exception Handler) to modify the context, especially RIP and RCX to hold the LoadLibraryA address and it's argument.

πŸ”— https://github.com/kleiton0x00/Proxy-DLL-Loads

πŸ₯ [ tweet ]
πŸ‘3πŸ”₯3
😈 [ ap @decoder_it ]

This is how a specific Group Policy configuration, enabling a security feature bypass, can lead to Privilege Escalation. Full details and examples in my latest blog post ;)

πŸ”— https://decoder.cloud/2024/01/23/do-not-trust-this-group-policy/

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ eversinc33 @eversinc33 ]

Small experiment today, inspired by @kaganisildak, using RCON protocol, as used by e.g. CS 1.6 as a C2 channel for the lulz.

πŸ”— https://github.com/eversinc33/1.6-C2

πŸ₯ [ tweet ]
πŸ‘8😁2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ eversinc33 @eversinc33 ]

Yea yea, EDR bypass this, VEH that, but have you every ran mimikatz while surfing in 1.6.? 😎😎

πŸ₯ [ tweet ]
πŸ”₯20😁7πŸ‘3
😈 [ Jonas Bülow Knudsen @Jonas_B_K ]

ADCS attack paths in BloodHound! πŸ₯³

This blog post breaks down the implementation of the ESC1 requirements and guides you on effectively leveraging BloodHound to identify attack paths that include ESC1 privileges.

πŸ”— https://posts.specterops.io/adcs-attack-paths-in-bloodhound-part-1-799f3d3b03cf

πŸ₯ [ tweet ]
πŸ‘2πŸ”₯1
Forwarded from APT
πŸ‘©β€πŸ’» Writing your own RDI /sRDI loader using C and ASM

Learn the process of crafting a personalized RDI/sRDI loader in C and ASM, incorporating code optimization to achieve full position independence.

πŸ”— https://blog.malicious.group/writing-your-own-rdi-srdi-loader-using-c-and-asm/

#maldev #reflective #dll #clang #asm
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘5
😈 [ William Burgess @joehowwolf ]

New CS blog: Introducing the Mutator Kit - Creating Object File Monstrosities with Sleep Mask and LLVM

πŸ”— https://www.cobaltstrike.com/blog/introducing-the-mutator-kit-creating-object-file-monstrosities-with-sleep-mask-and-llvm

πŸ₯ [ tweet ]
😈 [ FalconForce Official @falconforceteam ]

We are thrilled to publish SOAPHound: a custom-developed data collector tool to enumerate Active Directory environments via the ADWS-protocol. Enjoy!

πŸ”— https://falconforce.nl/soaphound-tool-to-collect-active-directory-data-via-adws/
πŸ”— https://github.com/FalconForceTeam/SOAPHound

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ 5pider @C5pider ]

Modern implant design: position independent malware development.

A small blog post on how to design "modern" malware with features like global variables, raw strings, and compile-time hashing.

πŸ”— https://5pider.net/blog/2024/01/27/modern-shellcode-implant-design
πŸ”— https://github.com/Cracked5pider/Stardust

πŸ₯ [ tweet ]
πŸ‘5
😈 [ Rasta Mouse @_RastaMouse ]

Demo version of CsWhispers is now public. Any and all feedback is welcome.

πŸ”— https://github.com/rasta-mouse/CsWhispers

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ Rasta Mouse @_RastaMouse ]

[BLOG]
Very short post containing some guidance on how to deal with ANYSIZE_ARRAY structures in C#.

πŸ”— https://rastamouse.me/anysize-array-csharp/

πŸ₯ [ tweet ]
πŸ‘2
😈 [ LuemmelSec @theluemmel ]

New blog by @itm4n is a must read for blue and red alike:

πŸ”— https://itm4n.github.io/printnightmare-exploitation/

Quality stuff as always. Thanks

I updated my Client-Checker to evaluate the affected reg keys so you can quickly check on your own if you might be affected or not:

πŸ”— https://github.com/LuemmelSec/Client-Checker

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ John Lambert @JohnLaTwC ]

Midnight Blizzard: Guidance for responders on nation-state attack

πŸ”— https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/

πŸ₯ [ tweet ]

ΠΎΡ… ΡƒΠΆ эти русскиС Π°ΠΏΡ‚ΡˆΠ½ΠΈΠΊΠΈ, Π·Π½Π°Π΅Ρ‚Π΅ Π»ΠΈ
😁6
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯10
😈 [ Aurélien Chalot @Defte_ ]

It's finally out: from a Windows driver to a fully functionnal driver. In this blogpost we'll go through the history of EDR's, how they used to work, how they work now and how we can build a fully functionnal one. Last step is a chall, bypass MyDumbEDR

πŸ”— https://sensepost.com/blog/2024/sensecon-23-from-windows-drivers-to-an-almost-fully-working-edr/

πŸ₯ [ tweet ]
πŸ‘3
😈 [ Slowerzs @slowerzs ]

I recently released ThievingFox, a collection of post-exploitation tools to gather credentials from various password managers and Windows utilities.

You can find my blogpost about it:

πŸ”— https://blog.slowerzs.net/posts/thievingfox/

And the Github repo of the tool:

πŸ”— https://github.com/Slowerzs/ThievingFox/

πŸ₯ [ tweet ]
πŸ‘2πŸ”₯2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ stacksmashing @ghidraninja ]

Lenovo X1 Carbon Bitlocker Key Sniffing any% Speedrun

(42.9 seconds)

Breaking Bitlocker: Bypassing the Windows Disk Encryption - using less than $10 of equipment:

πŸ”— https://youtu.be/wTl4vEednkQ

πŸ₯ [ tweet ]

расскаТитС этому ΠΏΠ°Ρ€Π½ΡŽ ΠΏΡ€ΠΎ Π°ΠΊΠΊΡƒΠΌΡƒΠ»ΡΡ‚ΠΎΡ€Π½ΡƒΡŽ ΠΎΡ‚Π²Π΅Ρ€Ρ‚ΠΊΡƒ
😁13πŸ‘4πŸ€”1