Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
Forwarded from Offensive Xwitter Eye
😈 [ C5pider, 5pider ]

Wrote a shitty Lsass memory parser. Always wanted to learn how mimikatz parses the Lsass memory. Harder than expected but got it to work. No code/memory cleanup for now lol.

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
πŸ‘2
😈 [ skelsec, SkelSec ]

Long time since I last wrote an article. Nothing earth-shattering, but fun!

πŸ”— https://skelsec.medium.com/lsass-needs-an-iv-57b7333d50d8

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ Dinosn, Nicolas Krassas ]

Articles with ready to use commands for pentest and CTF

https://t.co/zMnvHt01qU

πŸ”— https://hideandsec.sh/books/cheatsheets-82c

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ DirectoryRanger, DirectoryRanger ]

WMEye. tool for performing Lateral Movement using WMI and remote MSBuild Execution
https://t.co/wi9ZdNVrof

πŸ”— https://github.com/pwn1sher/WMEye

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ DirectoryRanger, DirectoryRanger ]

S4uDelegator. tool to perform S4U logon with SeTcbPrivilege, by @@daem0nc0re
https://t.co/7qFTFtX6Um

πŸ”— https://github.com/daem0nc0re/PrivFu#s4udelegator

πŸ₯ [ tweet ]
πŸ‘1
😈 [ m3g9tr0n, Spiros Fraganastasis ]

How the Active Directory Replication Model Works
https://t.co/oQKPMswqK5

πŸ”— https://premglitz.wordpress.com/2013/03/20/how-the-active-directory-replication-model-works/

πŸ₯ [ tweet ]
πŸ”₯2πŸ‘1
😈 [ citronneur, Sylvain Peyrefitte ]

Time Travel Debugging for #IDA https://t.co/9QRB0UBuAy

πŸ”— https://github.com/airbus-cert/ttddbg

πŸ₯ [ tweet ]
πŸ‘1
Forwarded from Offensive Xwitter Eye
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

Two-week security assessment is over, finally… Way too many lessons learned, oh well. Here’s the final step of taking down the critical OpenShift cluster with a single curl (hard-coded tokens is always a bad idea). So current mood is like the Burning Chrome last paragraphs 🫑

πŸ₯ [ tweet ]
😈 [ DebugPrivilege, β€’ ]

I came across a video of a talk from @MSwannMSFT on Intrusion Detection with Graphs https://t.co/4hKezgfM6N - interesting talk for blue teamers!

πŸ”— https://youtu.be/tGWSnuyZ4GQ

πŸ₯ [ tweet ]
⚠️ DISCLAIMER ⚠️

‼️ All information posted in this channel (https://t.iss.one/OffensiveTwitter) is intended for research and/or educational purposes only.

‼️ The owner of this channel is NOT responsible for any illegal use of the information this channel is providing or referring to.

‼️ The owner of this channel does NOT promote any illegal activity related to unethical hacking, cybercrimes, malware distribution, etc.

‼️ Remember that computer crimes are ALWAYS punishable by the law, so please do watch what you are doing.

#disclaimer
😁8
😈 [ HackingLZ, Justin ]

Actual details on the Confluence CVE-2022-26134

https://t.co/qU3BfAQEa9

πŸ”— https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/

πŸ₯ [ tweet ]
πŸ‘1
😈 [ vxunderground, vx-underground ]

We've updated the vx-underground Malware Analysis collection. We have added 13 new papers courtesy of @malpedia.

Check it out here: https://t.co/djuVYEkbLT

Have a nice day.

πŸ”— https://www.vx-underground.org/malware_defense.html#malware_analysis

πŸ₯ [ tweet ]