Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ irsdl, Soroush Dalili ๐Ÿ—น ]

Burp Suite #Sharpener v3.0 is out in the GitHub repo: https://t.co/jB9KLTlora

Some bugs have been fixed and icons sizes are now bearable!

This is only compatible with Burp v2023.1 (early adaptor currently) as it is based on the new Montoya API v1.0.

๐Ÿ”— https://github.com/mdsecresearch/BurpSuiteSharpener/tree/main/release

๐Ÿฅ [ tweet ]

ะ˜ะšะžะะšะ˜ ะ”ะ›ะฏ ะ‘ะฃะ ะŸะ ะ›ะฎะ”ะ˜ ะŸะžะงะ•ะœะฃ ะฃ ะœะ•ะะฏ ะญะขะž ะ•ะฉะ• ะะ• ะฃะกะขะะะžะ’ะ›ะ•ะะž
๐Ÿ˜ˆ [ nikhil_mitt, Nikhil Mittal ]

[Blog] My non-tech post on "Our vision for Red Team Labs, Platform and Certifications (CRTP, CRTE, CARTP and more)"
#AlteredSecurity

https://t.co/D4fFL6RcwG

๐Ÿ”— https://www.alteredsecurity.com/post/redlabs

๐Ÿฅ [ tweet ]
IMG_5582.PNG
3.4 MB
๐Ÿ˜ˆ [ last0x00, last - @last0x00@infosec.exchange ]

I was today years old when I found out there is a #CrackMapExec reference in graphical PNG format with a resolution of more than 7000x10000 hosted here๐Ÿ‘‡

https://t.co/Q7HgNqDK9Q

๐Ÿ”— https://raw.githubusercontent.com/Ignitetechnologies/Mindmap/main/Crackmapexec/Crackmapexec%20HD.png

๐Ÿฅ [ tweet ]
๐Ÿคฏ2๐Ÿ”ฅ1
IMG_5583.PNG
2 MB
๐Ÿ˜ˆ [ Jenaye_fr, Jenaye ]

Hello everyone ! ๐Ÿ‘‹

I would like to share with you a mindmap (v1) about bypassing AV/EDR.

In Redteam setup, I suggest the manual mode only.

Thanks to @Zabannn for his contribution

Link : https://t.co/2eOWcBMXzc

#BypassAV #BypassEDR #RT

๐Ÿ”— https://github.com/CMEPW/BypassAV

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ2
๐Ÿ˜ˆ [ 0x0SojalSec, Md Ismail ล ojal๎จ€ ]

Nuclei Automation.โš”๏ธ

https://t.co/CDes83cCD0

Full Nuclei automation script with logic explanation

#bugbountytips #infosec #nuclei #automation

๐Ÿ”— https://github.com/iamthefrogy/nerdbug

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1๐Ÿ˜1
๐Ÿ‘น [ snovvcrash, sn๐Ÿฅถvvcr๐Ÿ’ฅsh ]

[#HackTip โš’๏ธ] One idea for NTDS on-site dumping without VSS: NTFSCopy (thx @RedCursorSec) + #impacketโ€™s RemoteOperations.getBootKey() + secretsdump[.]py (e.g., via a pre-compiled binary or @naksynโ€™s awesome Pyramid) ๐Ÿคช

https://t.co/0UATJuJ1ob

๐Ÿ”— https://ppn.snovvcrash.rocks/pentest/infrastructure/ad/credentials-dump/ntds#raw-ntds.dit-copy

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ˜ˆ [ filip_dragovic, Filip Dragovic ]

Another way to abuse SeImpersonate privilege.
This time using RasMan service.
https://t.co/FmWTBrKkCy

๐Ÿ”— https://github.com/crisprss/RasmanPotato

๐Ÿฅ [ tweet ]
๐Ÿฅฑ1
๐Ÿ˜ˆ [ pdiscoveryio, ProjectDiscovery.io ]

Learn all about SSL and TLS certificates in our hacker's guide! Get up to speed with TLSx from ProjectDiscovery, the fast & configurable tool for finding vulnerabilities & reconnaissance. #hackwithautomation #cybersecuritytips

https://t.co/uKhaSB90Nq

๐Ÿ”— https://blog.projectdiscovery.io/a-hackers-guide-to-ssl-certificates-featuring-tlsx/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ garrfoster, Garrett ]

New blog post building on @Oddvarmoe 's original research with pre-created computer accounts. I share how sysadmins are inadvertently creating them and how they can be used to circumvent domain join restrictions.

https://t.co/tezVz1caxU

๐Ÿ”— https://www.optiv.com/insights/source-zero/blog/diving-deeper-pre-created-computer-accounts

๐Ÿฅ [ tweet ]
ะะตะผะฝะพะณะพ ััั‹ะปะพะบ ะฟั€ะพ DCSync, ะผะตั‚ะพะดั‹ ะตะณะพ ะดะตั‚ะตะบั‚ะฐ ะธ ะพะฑั…ะพะด ัะตั‚ะตะฒะพะน ัะธะณะฝะฐั‚ัƒั€ัƒ IDS ั secretsdump.py:

https://habr.com/ru/company/rvision/blog/709866/

https://habr.com/ru/company/rvision/blog/709942/

https://threadreaderapp.com/thread/1622684071473123351.html

#dcsync
๐Ÿ˜ˆ [ bohops, bohops ]

Just wanted to thank @snovvcrash for contributing a PowerShell DLL assembly loader to the DynamicDotNet repo! ๐Ÿ™

https://t.co/RRx7eneF5o

๐Ÿ”— https://github.com/bohops/DynamicDotNet/blob/main/assembly_loader/DynamicAssemblyDllLoader.ps1

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ PortSwiggerRes, PortSwigger Research ]

The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2022!
https://t.co/NXiHK9eUjT

๐Ÿ”— https://portswigger.net/research/top-10-web-hacking-techniques-of-2022

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ BHinfoSecurity, Black Hills Information Security ]

BHIS | Tester's Blog

Rogue RDP โ€“ Revisiting Initial Access Methods
by: @ustayready
Published: 2/28/2022

Learn More: https://t.co/Uaps11rLlF

๐Ÿ”— https://www.blackhillsinfosec.com/rogue-rdp-revisiting-initial-access-methods/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ aetsu, ๐•ฌ๐–Š๐–™๐–˜๐–š ]

Offphish - Phishing revisited in 2023 https://t.co/IQj5QfoXj8

๐Ÿ”— https://www.securesystems.de/blog/offphish-phishing-revisited-in-2023/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ mrgretzky, Kuba Gretzky ]

Great post by @m417z on overcoming difficulties with the implementation of system-wide process DLL injection.

https://t.co/QHS4E0rL3P

๐Ÿ”— https://m417z.com/Implementing-Global-Injection-and-Hooking-in-Windows/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ splinter_code, Antonio Cocomazzi ]

๐Ÿ”ฅ Brace yourself #LocalPotato is out ๐Ÿฅ”
Our new NTLM reflection attack in local authentication allows for arbitrary file read/write & elevation of privilege.
Patched by Microsoft, but other protocols may still be vulnerable.
cc @decoder_it

Enjoy! ๐Ÿ‘‡
https://t.co/3Lge45hb7L

๐Ÿ”— https://www.localpotato.com/localpotato_html/LocalPotato.html
๐Ÿ”— https://github.com/decoder-it/LocalPotato

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ OtterHacker, OtterHacker ]

I published my Kerberos experiments. The code is here for educational use only. Do not use it for pentest as it is neither OPSEC nor stable and kinda messy.

But if you want to see how to play with #Kerberos with #Windows, it can be a starting point ! ๐Ÿ˜Š

https://t.co/CPP2EfSKCb

๐Ÿ”— https://github.com/OtterHacker/Cerbere

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ2