Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ Alex neff @al3x_n3ff ]

A new Module by @Shad0wCntr0ller just got merged into NetExec.
You can now automatically query for all outdated operating systems in ldapπŸ”₯
Besides the OS and the name, you will also get the IP as well as the pwdLastSet attribute for that computer account.

πŸ₯ [ tweet ]
πŸ”₯6πŸ‘4
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯15πŸ‘1
😈 [ Melvin langvik @Flangvik ]

FULLHD OFFICIAL OFFSEC C2 Tier List

πŸ”— https://www.youtube.com/live/iYKItfBbPoY?si=AoUAwkwdUS30lEwe

πŸ₯ [ tweet ]
πŸ‘4
Offensive Xwitter
😈 [ Melvin langvik @Flangvik ] FULLHD OFFICIAL OFFSEC C2 Tier List πŸ”— https://www.youtube.com/live/iYKItfBbPoY?si=AoUAwkwdUS30lEwe πŸ₯ [ tweet ]
😈 [ Melvin langvik @Flangvik ]

List is completeπŸ˜‚ Thanks to all who joined live! I had a blast, and I hope you all did tooπŸ₯³ Next week, same time, I'm apparently doing an EDR tier list... 🀑If u missed it, VOD is here:

πŸ”— https://youtu.be/iYKItfBbPoY

πŸ₯ [ tweet ]
πŸ₯±5πŸ‘4
😈 [ Red Siege Information Security @RedSiege ]

πŸ›  NEW TOOL πŸ› 

Introducing: Jigsaw
Developed by Principal Security Consultant @hardwaterhacker

Link:
πŸ”— https://redsiege.com/jigsaw

A Python tool that scrambles shellcode bytes, providing a possibly undetectable payload.

Start challenging traditional detection with this low-entropy, puzzle-like approach.

πŸ₯ [ tweet ]

ΠΊΡ€ΠΈΠ½ΠΆ, Π½ΠΎ большС Π½ΠΈΡ‡Π΅ интСрСсного Π½Π΅Ρ‚
πŸ‘8
😈 [ Adam Chester πŸ΄β€β˜ οΈ @_xpn_ ]

New blog post is up... Identity Providers for RedTeamers. This follows my #SOCON2024 talk, and provides the technicals behind the presentation, looking at other IdP's and what techniques are effective beyond Okta.

πŸ”— https://blog.xpnsec.com/identity-providers-redteamers/

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ πŸ“” Michael Grafnetter @MGrafnetter ]

Extending Active Directory Users and Computers context menus with PowerShell

πŸ”— https://www.dsinternals.com/en/extending-active-directory-aduc-context-menu-powershell/

πŸ₯ [ tweet ]
πŸ‘6
😈 [ Guillaume Caillé @OffenseTeacher ]

Just published my methodology for finding good DLL side-loading candidates while avoiding using DllMain for injection to bypass Loader Lock limitations.
If you have been struggling with this, I hope this saves you time in the future.

πŸ”— https://www.okiok.com/achieving-dll-side-loading-in-the-original-process/

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ SapientFlow @sapientflow ]

My first ever blog post is out:

πŸ”— https://medium.com/@sapientflow/finding-pastures-new-an-alternate-approach-for-implant-design-644611c526ca

Happy for any constructive criticism or anyone that just wants to engage on the topic.

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ Lsec @lsecqt ]

My blog about executing shellcodes via Direct Pointer is live:

While this is something relatively simple as a concept, I felt like the Red Teaming Army needed such content.

πŸ”— https://lsecqt.github.io/Red-Teaming-Army/malware-development/leveraging-the-direct-pointer---a-stealthy-maneuver-in-evasion-tactics/

πŸ₯ [ tweet ]

#для_самых_ΠΌΠ°Π»Π΅Π½ΡŒΠΊΠΈΡ…
πŸ‘5😁2
😈 [ Pedro Gabaldon @PedroGabaldon ]

Just landed 2 PRs on Impacket:

πŸ”— https://github.com/fortra/impacket/pull/1719
πŸ”— https://github.com/fortra/impacket/pull/1719

πŸ₯ [ tweet ]

SAM/LSA Ρ‡Π΅Ρ€Π΅Π· shadow copy
πŸ”₯5
😈 [ Zero Day Engineering @zerodaytraining ]

Release: VM Escape Exploit for Parallels Desktop Hypervisor (Pwn2Own 2021) (source code + video walkthrough)

A virtual machine escape exploit will typically require kernel privileges in the guest OS. In this exploit I chose to offload the reverse-engineered toolgate protocol implementation to a Python module, while keeping my low-level kernel code minimal, just enough to implement the attack interface - a nod to the principle of least privilege in systematic software engineering, which we miss a lot in non-trivial exploit development. -- @alisaesage

πŸ”— https://zerodayengineering.com/research/pwn2own-2021-vm-escape.html

πŸ₯ [ tweet ]
πŸ”₯3πŸ‘1
😈 [ bakki @shubakki ]

Naively bypassing new memory scanning POCs

first chapter of two, stay tuned 🀠

πŸ”— https://sillywa.re/posts/flower-da-flowin-shc/

πŸ₯ [ tweet ]
πŸ”₯2🀯1
😈 [ Mayfly @M4yFly ]

New lab 🏰 for the GOAD project πŸ₯³: SCCM
You can now test the SCCM/MECM attacks locally on Virtualbox or Vmware.

More information here:
πŸ”— https://mayfly277.github.io/posts/SCCM-LAB-part0x0/

Repository here:
πŸ”— https://github.com/Orange-Cyberdefense/GOAD

Thx again @KenjiEndo15 for your help to building this!

πŸ₯ [ tweet ]
πŸ‘2
😈 [ eversinc33 πŸ©ΈπŸ—‘οΈ @eversinc33 ]

New blogpost and small tool release: Wrote a naive anti-rootkit driver that detects mapped drivers, and talk about some bypasses for those detections in part I of my new (anti-)-anti-rootkit series.

More research on rootkit evasion coming soon : )

πŸ”— https://eversinc33.com/posts/anti-anti-rootkit-part-i/

πŸ₯ [ tweet ]
πŸ‘1πŸ”₯1
😈 [ Melvin langvik @Flangvik ]

Had an absolute blast on stream today, thank you so much to everyone who showed up☺ VOD is on YouTube if you missed itπŸ‘ Allot of people came with input, so naturally I 100% blame chat for this now OFFICIAL OFFSEC EDR TIER LIST

πŸ”— https://youtube.com/live/2H-Wlxq1kpo

πŸ₯ [ tweet ]

Kaspersky - B, Π²Ρ‹ поняли
πŸ₯±7
Forwarded from 1N73LL1G3NC3
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2024-1086 Linux kernel LPE

Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.

A full write-up of the exploit - including background information and loads of useful diagrams - can be found in the Flipping Pages blogpost.
πŸ”₯18πŸ‘1
😈 [ The Haagβ„’ @M_haggis ]

Code blocks are free!!!

πŸ”— https://www.zscaler.com/blogs/security-research/european-diplomats-targeted-spikedwine-wineloader

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ Nettitude Labs @Nettitude_Labs ]

Introducing SharpConflux, a .NET tool built to facilitate Confluence exploration during Red Team engagements.

Find out more and download SharpConflux in our latest LRQA Nettitude Labs article.

πŸ”— https://labs.nettitude.com/blog/introducing-sharpconflux/

πŸ₯ [ tweet ]
πŸ”₯5πŸ‘1πŸ₯±1
😈 [ Zoro @Evi1cg ]

atexec-pro

πŸ”— https://github.com/ridter/atexec-pro
πŸ”— https://www.zcgonvh.com/post/Advanced_Windows_Task_Scheduler_Playbook-Part.3_from_RPC_to_lateral_movement.html

πŸ₯ [ tweet ]

люблю Ρ‚Π°ΠΊΠΎΠΉ ΠΊΡ€Π΅Π°Ρ‚ΠΈΠ²
πŸ‘4