Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ vxunderground, vx-underground ]

We've updated the vx-underground malware collection.

- Xloader
- Enemybot
- WSL Malware
- Chromeloader/Choziosi
- Chaos / Yashma Ransomware
- Pymafka

Download malware. It is good for you.

Check it out here: https://t.co/L3GdoH9kLl

πŸ”— https://samples.vx-underground.org/samples/Families/

πŸ₯ [ tweet ]
😈 [ decoder_it, ap ]

Calling msdt.exe is surprisingly sometimes legitimate πŸ˜…

πŸ₯ [ tweet ]
😈 [ HackingLZ, Justin ]

But it's a private vetted tool which was the thing people always wanted...

πŸ₯ [ tweet ]
😈 [ GoSecure_Inc, GoSecure ]

Read this analysis by GoSecure Titan Labs of the two vulnerabilities found in 3CX Phone Systems, authenticated command injection and privilege escalation: https://t.co/dhfxLA950o #pentesting #cybersecurity #GoSecureTitanLabs

πŸ”— https://www.gosecure.net/blog/2022/05/31/security-advisory-multiple-vulnerabilities-impact-3cx-phone-system/

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

Fantastic Windows Logon types and Where to Find Credentials in Them, by @chiragsavla94
https://t.co/qFUEG8HdWC

πŸ”— https://www.alteredsecurity.com/post/fantastic-windows-logon-types-and-where-to-find-credentials-in-them

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ Tyl0us, Matt Eidelberg ]

Check out my talk focusing on shining a light on the mindset of a red team and how they covertly compromise an organization’s security. Lots of great TTPs and stories to share check it out #SourceZeroCon https://t.co/FiiVCJhi0t #netsec #redteam #evasion

πŸ”— https://bit.ly/3K3argl

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ aetsu, π•¬π–Šπ–™π–˜π–š ]

A blueprint for evading industry leading endpoint protection in 2022 -> https://t.co/Vf69P9ZUuA

πŸ”— https://vanmieghem.io/blueprint-for-evading-edr-in-2022/

πŸ₯ [ tweet ]
πŸ”₯2
Forwarded from Offensive Xwitter Eye
😈 [ harmj0y, Will Schroeder ]

In my first foray into what @moo_hax terms "Offensive ML", I took at shot at data mining documents for passwords using deep learning. You can read about the approach at https://t.co/oL7jBbPiJQ and can find the notebook + Dockerized model at https://t.co/jXsMDVEwOo

πŸ”— https://posts.specterops.io/deeppass-finding-passwords-with-deep-learning-4d31c534cd00
πŸ”— https://github.com/GhostPack/DeepPass

πŸ₯ [ tweet ]
πŸ”₯1
Forwarded from Offensive Xwitter Eye
😈 [ C5pider, 5pider ]

Wrote a shitty Lsass memory parser. Always wanted to learn how mimikatz parses the Lsass memory. Harder than expected but got it to work. No code/memory cleanup for now lol.

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
πŸ‘2
😈 [ skelsec, SkelSec ]

Long time since I last wrote an article. Nothing earth-shattering, but fun!

πŸ”— https://skelsec.medium.com/lsass-needs-an-iv-57b7333d50d8

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ Dinosn, Nicolas Krassas ]

Articles with ready to use commands for pentest and CTF

https://t.co/zMnvHt01qU

πŸ”— https://hideandsec.sh/books/cheatsheets-82c

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ DirectoryRanger, DirectoryRanger ]

WMEye. tool for performing Lateral Movement using WMI and remote MSBuild Execution
https://t.co/wi9ZdNVrof

πŸ”— https://github.com/pwn1sher/WMEye

πŸ₯ [ tweet ]