Offensive Xwitter
19.3K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ ShitSecure, S3cur3Th1sSh1t ]

The last two weekends plus some evenings I spend my time writing a Nim Packer/Loader, which will be provided to Sponsors only via private repo. It's capable of packing C# Assemblies, Shellcode or PE-Files.

It's using my GetSyscallStub function to retrieve unhooked Syscalls from ntdll.dll to patch AMSI and/or ETW. The shellcode execution is also done via Syscalls from GetSyscallStub. This function will become public in Q1 2022.

The detection rate is at this time pretty good. One more reason for this repo to stay private. And theese binaries had no sandbox evasion checks, no sleep time and were not obfuscated via LLVM. I'll add sandbox evasion methods later on.

πŸ”— https://www.patreon.com/S3cur3Th1sSh1t
πŸ”— https://github.com/sponsors/S3cur3Th1sSh1t

πŸ₯ [ tweet ]
πŸ‘1
😈 [ m3g9tr0n, Spiros Fraganastasis ]

An excellent article by @martinsohndk about Windows Shares post exploitation activities! You will be impressed with the amount of information which can be found by digging in shares https://t.co/LiriUP3xVE

πŸ”— https://improsec.com/tech-blog/network-share-risks-deploying-secure-defaults-and-searching-shares-for-sensitive-information-credentials-pii-and-more

πŸ₯ [ tweet ]
πŸ‘1
😈 [ fr0gger_, Thomas Roccia 🀘 ]

I published a blogpost that presents ten useful python libraries that I use for malware analysis and reversing (with code examples)!

Which one are you using the most? 🐍
#python #malware #cybersecurity #infosec

https://t.co/4q7N0ydQJa

πŸ”— https://blog.securitybreak.io/10-python-libraries-for-malware-analysis-and-reverse-engineering-622751e6ebd0

πŸ₯ [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]

My DInvoke implementation in Nim is now also public:

https://t.co/4sNjTVsYfv

Feel free with testing and have fun! πŸ»πŸ‘Œ

Challenge: who modifies the Nim compiler for DInvoke usage?πŸ€“

πŸ”— https://github.com/S3cur3Th1sSh1t/Nim_DInvoke

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ ntlmrelay, Ring3API ]

🐍 Python utility to generate #MITRE ATT&CK Vault for #Obsidian.
1️⃣Get Obsidian (https://t.co/ZBOCQ2ez7U)
2️⃣Generate Vault (https://t.co/3A5dbhoRC2)
3️⃣Explore!

#blueteam #threathunting #ThreatIntelligence

πŸ”— https://obsidian.md/
πŸ”— https://github.com/arch4ngel/sec-vault-gen

πŸ₯ [ tweet ]
πŸ‘2
😈 [ DebugPrivilege, β€’ ]

Great blog post on hijacking Azure subscriptions. https://t.co/i2zQHrazu2

πŸ”— https://derkvanderwoude.medium.com/azure-subscription-hijacking-and-cryptomining-86c2ac018983

πŸ₯ [ tweet ]
😈 [ bohops, bohops ]

[Quick Update] Added a few new and old resources/techniques to the WDAC Block List

https://t.co/2AhEtQ2aS0

I'll post a few more blogs in the coming months to include Part 3 of the "Exploring the Microsoft Recommended Block Rules" series as well as some new
techniques

πŸ”— https://github.com/bohops/UltimateWDACBypassList

πŸ₯ [ tweet ]
😈 [ byt3bl33d3r, Marcello ]

This is neato
"Alpine, Ubuntu, Fedora, and Arch based containers containing full desktop environments in officially supported flavors accessible via any modern web browser."
https://t.co/VSTYMXDYma

πŸ”— https://docs.linuxserver.io/images/docker-webtop

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ Six2dez1, Six2dez ]

I can't say enough about how useful @TomNomNom's hacks repository is. Lately whenever I need something I go there to take a look because it almost always has the solution, so I can never improve my Golang skills!

Latest discovery https://t.co/0DYgf4qkko

long live open source❀️

πŸ”— https://github.com/tomnomnom/hacks/tree/master/inscope

πŸ₯ [ tweet ]
πŸ‘1