Offensive Twitter
19.1K subscribers
888 photos
47 videos
21 files
2.05K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ NandanLohitaksh, Lohitaksh Nandan ]

Best ever Tools ๐Ÿ”ง for Bug Bounty Hunters...

โ†’Amass
โ†’Sublister
โ†’Gauplus
โ†’HTTPX
โ†’Gf tool
โ†’Kxss
โ†’Sqlmap
โ†’Commix
โ†’Tplmap
โ†’HYDRA
โ†’John the ripper
โ†’Burpsuite
โ†’Arjun
โ†’Paramspider
โ†’NoSQLmap
โ†’NMAP
โ†’Nikto
โ†’FFUF
โ†’403-Bypass
โ†’Gobuster

#bugbounty #cybersecurity

๐Ÿฅ [ tweet ]
๐Ÿ‘2
๐Ÿ˜ˆ [ bmcder02, Blake ]

Recently I got asked to do an overview on ETW. I tried to cover everything useful for #DFIR, including multiple ways to capture ETW, useful providers and finding existing trace sessions.
#cybersecurity
https://t.co/3IWn9w6JuQ

๐Ÿ”— https://bmcder.com/blog/a-begginers-all-inclusive-guide-to-etw

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ Tarlogic, Tarlogic ]

#ZeroTrust is one of the trending concepts in the #cybersecurity world. But the hype around it is perhaps a bit excessive. In this article, we explain why... ๐Ÿ‘‡

https://t.co/hUiMeq6bnR

๐Ÿ”— https://www.tarlogic.com/blog/demystifying-zero-trust/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ReconOne_, ReconOne ]

Shodan Dork in Manual mode - Part 1

Now that you all have Shodan membership it's time to try Shodan Dorks ๐Ÿ‘€๐Ÿ‘‡

Credits: @securitytrails

#recon #Shodan #attacksurface #bugbountytips #BugBounty #cybersecurity

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ NationalCyberS1, National Cyber Security Services ]

LinWinPwn:- A bash script that automates a number of Active Directory Enumeration and Vulnerability checks.

Link:https://t.co/pR8suEn8PZ

#hacking #bugbountytips #informationsecurity #cybersecurity #infosec #cybersecuritytips #Ethicalhacking #Pentesting

https://t.co/uJj502OabP

๐Ÿ”— https://github.com/lefayjey/linWinPwn
๐Ÿ”— https://ncybersecurity.com

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ Idov31, Ido Veltzman ]

I'm happy to release Venom - A C++ single header file for evasive network communication which using a stolen browser's socket to perform all of its network activities and by that can make it hard to trace it back to the process.

https://t.co/AVxQbNru3Z

#infosec #CyberSecurity

๐Ÿ”— https://github.com/Idov31/Venom

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ Octoberfest73, Octoberfest7 ]

Iโ€™m pleased to release Inline-Execute-PE, a CobaltStrike toolkit enabling users to load and repeatedly run unmanaged Windows exeโ€™s in Beacon memory without dropping to disk or creating a new process each time. https://t.co/1byTo7uCV1
#redteam #cybersecurity #malware

๐Ÿ”— https://github.com/Octoberfest7/Inline-Execute-PE

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ZeroMemoryEx, V2 ]

New AMSI lifetime bypass, it works by searching for the first byte of each instruction to prevent updates from affecting it, Check it out.
#amsi #redteam #cybersecurity
https://t.co/J6lBOXWFyx

๐Ÿ”— https://github.com/ZeroMemoryEx/Amsi-Killer

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ kleiton0x7e, Kleiton Kurti ]

Created a blogpost & a PoC for a custom Sleep Mask Kit that obfuscates data within a beacon's stack, prior to custom sleeping, by leveraging CPU cycles.
A great approach against memory investigation.

๐Ÿ—’๏ธBlog: https://t.co/sop7XnF5tc

#cybersecurity #redteam #infosec

๐Ÿ”— https://whiteknightlabs.com/2023/05/02/masking-the-implant-with-stack-encryption/

๐Ÿฅ [ tweet ]
๐Ÿคฏ3
๐Ÿ˜ˆ [ kleiton0x7e, Kleiton Kurti ]

We took a Cobalt Strike profile, modified it, and bypassed Crowdstrike & Sophos without encrypting the shellcode. Also bypassed all published YARA rules, sleep detections, and string detections around a CS beacon.

Blog: https://t.co/m7FNOwV6Nx

#CyberSecurity #redteam #infosec

๐Ÿ”— https://whiteknightlabs.com/2023/05/23/unleashing-the-unseen-harnessing-the-power-of-cobalt-strike-profiles-for-edr-evasion/

๐Ÿฅ [ tweet ]
๐Ÿ‘1
๐Ÿ˜ˆ [ kleiton0x7e, Kleiton Kurti ]

Came up with an improved version of WMIExec. By leveraging the Win32_ScheduledJob class, we can remotely create scheduled jobs. This way it's not required anymore to rely on port 139 and 445.

Github:

#CyberSecurity #redteam #infosec #infosecurity

๐Ÿ”— https://github.com/WKL-Sec/wmiexec/

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ r1cksec, r1cksec ]

New cheatsheets pushed ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿ”— https://github.com/r1cksec/cheatsheets

Including:

A well written blog post on how to read and parse LSASS memory dumps with PowerShell ๐Ÿ”

#infosec #cybersecurity #pentesting #redteam #lsass #windows

๐Ÿ”— https://powerseb.github.io/posts/LSASS-parsing-without-a-cat

๐Ÿฅ [ tweet ]
๐Ÿ‘4
๐Ÿ˜ˆ [ Idov31, Ido Veltzman ]

Part 5 of Lord Of The Ring0 is out!

On this part, I explained how APC and thread injection made from the kernel to a user mode process, IRP & SSDT hook, why they don't work anymore (and their alternatives)

#infosec #CyberSecurity

๐Ÿ”— https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
๐Ÿ˜ˆ [ Kleiton Kurti @kleiton0x7e ]

Spent some time reversing undocumented Syscalls residing in Kernel32/Ntdll and created a PoC for proxying DLL loads. This leads to a clean call stack as the return address pointing to shellcode won't be pushed to stack.

#CyberSecurity #redteam #infosec

๐Ÿ”— https://github.com/kleiton0x00/Proxy-DLL-Loads

๐Ÿฅ [ tweet ]
๐Ÿ‘4๐Ÿ”ฅ1
๐Ÿ˜ˆ [ Ido Veltzman @Idov31 ]

Weekly Nidhogg update
Driver hiding feature is also finished and live in the dev branch: :)
On the photos you can see the before and after in DriverView (From Nirsoft's tools)

๐Ÿ”— https://github.com/Idov31/Nidhogg/tree/dev

#infosec #CyberSecurity

๐Ÿฅ [ tweet ]
๐Ÿ‘4
๐Ÿ˜ˆ [ WHOAMI @wh0amitz ]

To audit the security of read-only domain controllers, I created the SharpRODC project, a simple .NET tool for RODC-related misconfigurations.

๐Ÿ”— https://github.com/wh0amitz/SharpRODC

#infosec #redteam #cybersecurity #pentesting

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ Ido Veltzman @Idov31 ]

There was no update for a while and the reason being a massive bug fixes, feature checking and a new feature (fun fact: it is the 23th feature!).
Now, you can use Nidhogg to dump credentials from LSASS!
Go check it out:

๐Ÿ”— https://github.com/Idov31/Nidhogg/tree/dev

#infosec #CyberSecurity

๐Ÿฅ [ tweet ]
๐Ÿ‘3๐Ÿ˜3
๐Ÿ˜ˆ [ SchrodingersAV @SchrodingersAV ]

Read about a technique involving tampering with scheduled tasks, and was inspired to build a powershell script to edit scheduled tasks via the registry keys.
Can be used in memory with powershell!
#redteam #cybersecurity #hacking

๐Ÿ”— https://gist.github.com/Workingdaturah/991de2d176b4b8c8bafd29cc957e20c2

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3๐Ÿ‘1