Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ DSAS by INJECT @DevSecAS ]

πŸ†• Most cryptographers and packers use various methods to unpack and run a PE file from memory.

The most common techniques to this day are RunPE and LoadPE πŸ‘¨β€πŸ’»

πŸ”— https://injectexp.dev/b/LoadLibraryReloaded
πŸ”— https://t.iss.one/INJECTCRYPT/156

πŸ₯ [ tweet ]
πŸ”₯6πŸ‘3🍌1
😈 [ Alice Climent-Pommeret @AliceCliment ]

Hi there!

My latest article on the @harfanglab blog has just been published!

I'm talking about unpacking, XMRig, R77 and FIN7 (or not πŸ€“)

A special S/O to @splinter_code @JusticeRage and @securechicken

To check it out ⬇️

πŸ”— https://harfanglab.io/insidethelab/unpacking-packxor/

πŸ₯ [ tweet ][ quote ]
πŸ”₯3
😈 [ William Burgess @joehowwolf ]

New CS Blog - Revisiting the UDRL Part 3: If you like the idea of loading a custom c2 channel in your UDRL then this blog may be of interest πŸ‘€

πŸ”— https://www.cobaltstrike.com/blog/revisiting-the-udrl-part-3-beacon-user-data

πŸ₯ [ tweet ]
πŸ‘3
😈 [ Praetorian @praetorianlabs ]

πŸ”₯ Bypassing fully patched endpoint detection with Goffloader

We’re excited to introduce Goffloader, an open-source Golang COFFLoader. Compatible with Cobalt Strike BOFs πŸ˜‰

Read more on our blog here:

πŸ”— https://www.praetorian.com/blog/introducing-goffloader-a-pure-go-implementation-of-an-in-memory-coffloader-and-pe-loader/

πŸ₯ [ tweet ]
πŸ”₯11πŸ‘1
😈 [ CoreLabs Research @CoreAdvisories ]

In his latest blog, Core Labs' @ricnar456 takes a deep dive into CVE-2024-30051, reversing this Windows #vulnerability to create a functional #PoC.

πŸ”— https://www.coresecurity.com/core-labs/articles/windows-dwm-core-library-elevation-privilege-vulnerability-cve-2024-30051

πŸ₯ [ tweet ]
πŸ”₯7πŸ‘1
😈 [ Maurice Heumann @momo5502 ]

I have finished my blog post about my journey through KiUserExceptionDispatcher and how I added exception support to my emulator :D

πŸ”— https://momo5502.com/posts/2024-09-07-a-journey-through-kiuserexceptiondispatcher/

πŸ₯ [ tweet ]
πŸ‘3🀯1
😈 [ Cas van Cooten @chvancooten ]

I just published the pre-recorded video version of my Nimplant demonstration for @BlackHatEvents Arsenal 2024! Check it out if you're interested in Nimplant and its new features, such as the Rust implant.

πŸ“½οΈ Recording available here:
πŸ”— https://youtu.be/9xQGjdPyDJc

πŸ₯ [ tweet ]
πŸ‘2πŸ”₯1
Forwarded from Just Security
This media is not supported in your browser
VIEW IN TELEGRAM
ΠžΠΏΡƒΠ±Π»ΠΈΠΊΠΎΠ²Π°Π»ΠΈ Π²ΠΈΠ΄Π΅ΠΎΡ€ΠΎΠ»ΠΈΠΊ ΠΎ Ρ‚ΠΎΠΌ, ΠΊΠ°ΠΊ ΠΏΡ€ΠΎΡˆΠ»Π° СТСгодная нСзависимая прСмия Pentest award 2024!

РадостныС Π»ΠΈΡ†Π°, Ρ‚ΠΎΠ»ΠΏΠ° заряТСнных спСциалистов, ΠΈ, ΠΊΠΎΠ½Π΅Ρ‡Π½ΠΎ, счастливыС ΠΏΠΎΠ±Π΅Π΄ΠΈΡ‚Π΅Π»ΠΈ с Π½Π°Π³Ρ€Π°Π΄Π°ΠΌΠΈ Π² Ρ€ΡƒΠΊΠ°Ρ… β€” настоящий ΠΏΡ€Π°Π·Π΄Π½ΠΈΠΊ этичного Ρ…Π°ΠΊΠΈΠ½Π³Π°.

Π—Π΄ΠΎΡ€ΠΎΠ²ΠΎ Π±Ρ‹Π»ΠΎ встрСтится Π² ΠΎΡ„Π»Π°ΠΉΠ½Π΅ со старыми Π΄Ρ€ΡƒΠ·ΡŒΡΠΌΠΈ ΠΈ ΠΊΠΎΠ»Π»Π΅Π³Π°ΠΌΠΈ, ΠΏΠΎΠ·Π½Π°ΠΊΠΎΠΌΠΈΡ‚ΡŒΡΡ с Π½ΠΎΠ²Ρ‹ΠΌΠΈ людьми, ΠΎΠ±ΠΌΠ΅Π½ΡΡ‚ΡŒΡΡ знаниями ΠΈ идСями, ΠΏΠΎΠ³ΠΎΠ²ΠΎΡ€ΠΈΡ‚ΡŒ ΠΎ Π²Π°ΠΆΠ½ΠΎΠΌ, ΠΏΡ€ΠΎΡ„Π΅ΡΡΠΈΠΎΠ½Π°Π»ΡŒΠ½ΠΎΠΌ, наболСвшСм.

Π”ΠΎ встрСчи Π² 2025 Π³ΠΎΠ΄Ρƒ πŸ‘‹

ΠžΡ‚Π΄Π΅Π»ΡŒΠ½Π°Ρ Π±Π»Π°Π³ΠΎΠ΄Π°Ρ€Π½ΠΎΡΡ‚ΡŒ ΠΏΠ°Ρ€Ρ‚Π½Π΅Ρ€Π°ΠΌ ΠΏΡ€ΠΎΠ΅ΠΊΡ‚Π°: BI.ZONE Bug Bounty, VK Bug Bounty, OFFZONE ΠΈ CyberED.

πŸ“Ί ПолноС Π²ΠΈΠ΄Π΅ΠΎ
πŸ”— Pentest award (Π°Ρ€Ρ…ΠΈΠ²)
❀ @justsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘7😒2πŸ₯±2πŸ”₯1
😈 [ Daniel @0x64616e ]

Do you like ZSH, SOCKS proxies and Impacket? Then you might want to check this out:

πŸ”— https://github.com/dadevel/impacket-zsh-integration

πŸ₯ [ tweet ]

Π˜Π½Ρ‚Π΅Ρ€Π΅ΡΠ½ΠΎ ΠΏΠΎΡΠΌΠΎΡ‚Ρ€Π΅Ρ‚ΡŒ Π½Π° ΠΏΠΎΠ΄Ρ…ΠΎΠ΄Ρ‹ Π΄Ρ€ΡƒΠ³ΠΈΡ… людСй ΠΊ вопросу мСнСдТСрства ΠΊΠΎΠ½Ρ„ΠΈΠ³Π°ΠΌΠΈ проксичСйнс, я, Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, дСлаю это Ρ‚Π°ΠΊ:

πŸ”— https://github.com/snovvcrash/dotfiles-linux/blob/2c4ab52c09749190c63a8e05187c28800e196f0a/system/funcs#L62-L74
πŸ‘4
😈 [ Antonio Cocomazzi @splinter_code ]

Great talk by my friend @decoder_it at Troopers πŸ”₯
10 Years of Windows Privilege Escalation that includes the last iteration of the Potato exploits. Worth a watch! πŸ‘‡

πŸ”— https://www.youtube.com/watch?v=rPZx1zbKJnI

πŸ₯ [ tweet ]
πŸ‘4
😈 [ Scott Sutherland @_nullbind ]

[BLOG] Hijacking SQL Server Credentials using Agent Jobs for Domain Privilege Escalation

πŸ”— https://www.netspi.com/blog/technical-blog/network-pentesting/hijacking-sql-server-credentials-with-agent-jobs-for-domain-privilege-escalation/

πŸ₯ [ tweet ]
πŸ”₯5πŸ₯±1
😈 [ lazarusholic @lazarusholic ]

"Fake recruiter coding tests target devs with malicious Python packages" published by ReversingLabs.

πŸ”— https://www.reversinglabs.com/blog/fake-recruiter-coding-tests-target-devs-with-malicious-python-packages

πŸ₯ [ tweet ]
😁3πŸ€”2
😈 [ Pen Test Partners @PenTestPartners ]

Discover how our @_EthicalChaos_ edited Group Policy Objects (GPOs) without being tied to a domain-joined system πŸ” This technical blog explores the challenges of manipulating GPOs from non-domain environments using native Windows tools β€” minimising IOCs and maximising stealth in your red teaming efforts πŸ”΄

@_EthicalChaos_ details the process of manipulating the Group Policy Manager MMC snap-in, diving into debugging techniques, function manipulation, and the strategic use of hooks to bypass typical domain checks.

Discover how to intercept and modify critical functions like GetUserNameExW to bypass domain checks and tackle further complexities in the Group Policy Editor using hooks with the DGPOEdit tool, which @_EthicalChaos_ has put on GitHub for free.

This blog covers the technical barriers, API call modifications, and the challenges in creating a seamless experience with native toolingβ€”without compromising operational security. Perfect for those looking to leverage native Windows tools in their red teaming arsenal, this guide provides detailed insights into pushing beyond the limitations of standard approaches.

πŸ› οΈ Look at @_EthicalChaos_ methods and get access to the free DGPOEdit tool from the full blog now.

Read it here:
πŸ”— https://www.pentestpartners.com/security-blog/living-off-the-land-gpo-style/

πŸ₯ [ tweet ]
πŸ”₯6πŸ‘4😁1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ konrad @konradgajdus ]

I made a donut using the C standard library:

πŸ”— https://github.com/konrad-gajdus/donut

πŸ₯ [ tweet ]

красивоС
🍌15πŸ₯±6πŸ‘4🀯2πŸ”₯1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ JiΕ™Γ­ Vinopal @vinopaljiri ]

Inspired by @0gtweet, I created PoC: EXE-or-DLL-or-ShellCode that can be:

Executed as a normal #exe
Loaded as #dll + export function can be invoked
Run via "rundll32.exe"
Executed as #shellcode right from the DOS (MZ) header that works as polyglot stub

πŸ”— https://github.com/Dump-GUY/EXE-or-DLL-or-ShellCode

πŸ₯ [ tweet ]
πŸ‘5πŸ€”1
😈 [ Sam ☁️πŸͺ΅ @Sam0x90 ]

Interesting ZIP trick with __Macosx__ folder and LNK executing ftp script to execute embedded pythonw.exe

zip > docx LNK > ftp.exe > disguised pythonw.exe > CS shellcode

πŸ”— https://www.ctfiot.com/203334.html

πŸ₯ [ tweet ]
πŸ‘10
😈 [ Het Mehta @hetmehtaa ]

Reversing a VPN client to hijack sessions

πŸ”— https://rotarydrone.medium.com/decrypting-and-replaying-vpn-cookies-4a1d8fc7773e

πŸ₯ [ tweet ]
πŸ”₯9
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ John Hammond @_JohnHammond ]

Well, this was a stupid insomnia project, but... πŸ˜‚

Playground code is here:

πŸ”— https://github.com/JohnHammond/recaptcha-phish

πŸ₯ [ tweet ][ quote ]

Π·Π°Π²ΠΈΡ€ΡƒΡΠΈΠ»ΠΎΡΡŒ, ΠΏΡ€ΠΈΠΊΠΎΠ»ΡŒΠ½ΠΎ
😁18πŸ‘1πŸ₯±1
Offensive Xwitter
😈 [ JiΕ™Γ­ Vinopal @vinopaljiri ] Inspired by @0gtweet, I created PoC: EXE-or-DLL-or-ShellCode that can be: Executed as a normal #exe Loaded as #dll + export function can be invoked Run via "rundll32.exe" Executed as #shellcode right from the DOS (MZ) header…
😈 [ Kurosh Dabbagh @_Kudaes_ ]

Somebody asked if you can run a dll directly without rundll32 as you would do with an exe. You just need to remove the IMAGE_FILE_DLL flag from IMAGE_FILE_HEADER->Characteristics, which can be done with the option -e. Don't see much use for it tho ^^

πŸ”— https://github.com/Kudaes/CustomEntryPoint

πŸ₯ [ tweet ]
πŸ‘18
😈 [ Usman Sikander @UsmanSikander13 ]

Basics to advanced process injection. Covering 25 techniques:

πŸ”— https://github.com/Offensive-Panda/ProcessInjectionTechniques

πŸ₯ [ tweet ]
πŸ‘14