Offensive Twitter
19.1K subscribers
888 photos
47 videos
21 files
2.05K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ OscarAkaElvis, Γ“scar Alfonso DΓ­az ]

New Evil-WinRM release (v3.4). Released for the @uad360 cyber security event. C'mon @msftsecurity how about a new Defender signature? Let's dance 😁

https://t.co/PEwvSTxt8p

Thanks @CyberVaca_ @_Laox @arale61

#evilwinrm #winrm #hacking #pentesting

πŸ”— https://github.com/Hackplayers/evil-winrm

πŸ₯ [ tweet ]
πŸ‘2
😈 [ Six2dez1, Six2dez ]

I've packed in GitHub an @obsdmd's Vault for web pentesting assessments, it's still pretty simple but I included my Web Pentest Checklist updated, so feel free to contribute!

Here it is:
https://t.co/jx4a9UB2wT

#Pentesting #Web #Obsidian #Markdown #Hacking

πŸ”— https://github.com/six2dez/obsidian-pentesting-vault

πŸ₯ [ tweet ]
😈 [ NationalCyberS1, National Cyber Security Services ]

LinWinPwn:- A bash script that automates a number of Active Directory Enumeration and Vulnerability checks.

Link:https://t.co/pR8suEn8PZ

#hacking #bugbountytips #informationsecurity #cybersecurity #infosec #cybersecuritytips #Ethicalhacking #Pentesting

https://t.co/uJj502OabP

πŸ”— https://github.com/lefayjey/linWinPwn
πŸ”— https://ncybersecurity.com

πŸ₯ [ tweet ]
😈 [ HackerGautam, Frooti ]

Not only crawling but you can do Subdomain Enumeration using Wayback.

⬇️
curl --insecure --silent "https://web.archive.org/cdx/search/cdx" | sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | sed "/@/d" | sed -e 's/\.$//' | sort -u

#bugbounty #hacking #infosec

πŸ₯ [ tweet ]
😈 [ Rohan Aggarwal @nahoragg ]

My talk "Bypassing Anti-Cheats & Hacking Competitive Games" from @securityfest is now available on Youtube. #game #Hacking

πŸ”— https://youtu.be/bTU7huCmFXA

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ SchrodingersAV @SchrodingersAV ]

Read about a technique involving tampering with scheduled tasks, and was inspired to build a powershell script to edit scheduled tasks via the registry keys.
Can be used in memory with powershell!
#redteam #cybersecurity #hacking

πŸ”— https://gist.github.com/Workingdaturah/991de2d176b4b8c8bafd29cc957e20c2

πŸ₯ [ tweet ]
πŸ”₯3πŸ‘1