Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ thefLinkk, thefLink ]

Today we published a new tool to tamper with Sysmon.
Uses handle elevation and a SACL bypass to remain difficult to observe using Sysmon itself or Windows Event logs.

https://t.co/OZ4tkgNOAD

πŸ”— https://github.com/codewhitesec/SysmonEnte

πŸ₯ [ tweet ][ quote ]
😈 [ Six2dez1, Six2dez ]

I've packed in GitHub an @obsdmd's Vault for web pentesting assessments, it's still pretty simple but I included my Web Pentest Checklist updated, so feel free to contribute!

Here it is:
https://t.co/jx4a9UB2wT

#Pentesting #Web #Obsidian #Markdown #Hacking

πŸ”— https://github.com/six2dez/obsidian-pentesting-vault

πŸ₯ [ tweet ]
😈 [ M4yFly, Mayfly ]

Let's continue to pwn GOAD for fun and no profit :)
We will have fun with ADCS this time, thanks a lot to @ly4k_ for the certify tool πŸ™

https://t.co/QwIsA0ipM2

πŸ”— https://mayfly277.github.io/posts/GOADv2-pwning-part6/

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

A much needed module during internal pentest will be added to CrackMapExec tonight πŸŒ›

Why scan a /16 when you can get all ip/dns records of the domain using get-network module ? πŸ”₯

Thanks to @_dirkjan (this module is adidnsdump as module) and @snovvcrash for the cidr trick !

πŸ₯ [ tweet ]
😈 [ subtee, Casey Smith ]

Quick/easy alert if someone runs..
adfind.exe
qwinsta.exe
nltest.exe
tasklist.exe
seatbelt.exe
procdump64.exe
or _other_ odd, rare commands?

Give this a try?

❀️feedback, ways to improve.
It's not perfect, we know.
Help us improve/refine it.
https://t.co/tJ3buUL49E

πŸ”— https://github.com/thinkst/canarytokens

πŸ₯ [ tweet ]
😈 [ awakecoding, Marc-André Moreau ]

Get-RdpLogonEvent: extract the list of recent RDP logons from the event viewer and become a magician πŸ§™β€β™€οΈ that can answer impossible questions like "is it really using Kerberos (nope), or did it downgrade to NTLM (again)"? πŸ‘‡ https://t.co/1TKpLfZB5w

πŸ”— https://gist.github.com/awakecoding/5fda938a5fd2d29ebffb31eb023fe51c

πŸ₯ [ tweet ]
😈 [ _rybaz, Ryan Basden 🌻 ]

Always schedule your Q4 pentest in Q2

πŸ₯ [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Still so much stuff to learn. Can really recommend going through the posts of @EmericNasi when some free timeslot is available πŸ”₯

https://t.co/XeJ7MoxxPj

πŸ”— https://blog.sevagas.com/

πŸ₯ [ tweet ]
😈 [ HuskyHacksMK, Matt | HuskyHacks ]

πŸš€πŸŒ  Landed!

Happy to announce my PR for Nim shellcode generation support has been merged into the Metasploit Framework/MSFVenom!

huge thank you to @gray_sec whose PR for Go shellcode support lit the path. and thank you to the @rapid7 team for their help with the process!

πŸ’–βœŒ

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ C5pider, 5pider ]

Open sourced the "assembly execute" and "powerpick" module/command. Have fun.
https://t.co/tn87aai7nY

πŸ”— https://github.com/HavocFramework/Modules

πŸ₯ [ tweet ]
😈 [ mariuszbit, mgeeky | Mariusz Banach ]

Nice! LNK-ISO polyglot weaponisation idea:

1. Create LNK that copies & renames itself to ISO
2. Create LNK-ISO polyglot with @angealbertini Mitra
3. Double-click on LNK -> will pop with ISO's contents
4. Rename polyglot back to poly.lnk

Double-click & ISO pops up ✨

@domchell

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ httpyxel, yxel ]

Single stub direct and indirect syscalling rust library for windows :)

* Single stub
* One single line for all your syscalls
* Function name hashing at compilation time
* x86_64, WOW64 and x86 native support

https://t.co/e9VW04M1bK

πŸ”— https://github.com/janoglezcampos/rust_syscalls

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ x86matthew, x86matthew ]

WriteProcessMemoryAPC - Write memory to a remote process using APC calls

Another alternative to WriteProcessMemory!

https://t.co/JIzWS927Uc

πŸ”— https://www.x86matthew.com/view_post?id=writeprocessmemory_apc

πŸ₯ [ tweet ]