Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ LLM Security @llm_sec ]

Remote Code Execution by Server-Side Template Injection in Model Metadata

CVSS 9.7 in llama_cpp_python

found by @retr0reg

๐Ÿ”— https://github.com/abetlen/llama-cpp-python/security/advisories/GHSA-56xg-wfcc-g829

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3๐Ÿ‘1
๐Ÿ˜ˆ [ Nicolas Krassas @Dinosn ]

PoC for using MS Windows printers for persistence / command and control via Internet Printing

๐Ÿ”— https://github.com/Diverto/IPPrintC2

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ6๐Ÿ‘2
๐Ÿ˜ˆ [ CravateRouge @rouge_cravate ]

Performing kerberos cross domain authentication with impacket is not straightforward!
If you want to authenticate on domain A (trusting domain B) with a userB you must ask a ST to domain B for krbtgt/domainA and then use this ST to request new ST to domainA, e.g.:

๐Ÿฅ [ tweet ]

ะ‘ for ะ‘ะฐัะฝ
๐Ÿ”ฅ5
๐Ÿ˜ˆ [ sinusoid @the_bit_diddler ]

I'm intending to release an open-source Visual Studio Code extension to make writing BOFs easier for the community:

- Complete Nt/Zw function prototypes with tab completion (and correct typecasting for placeholder variables)
- MSDN header searching

PoC:

๐Ÿ”— https://www.youtube.com/watch?v=oWss4Ac9Pl8

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ Steve S. @0xTriboulet ]

@vxunderground

BSides Talk on Writing malware in Nim w/o the Nim Runtime

๐Ÿ”— https://github.com/m4ul3r/writing_nimless/blob/main/Writing%20Nimless%20nim.pdf

๐Ÿฅ [ tweet ]
๐Ÿคฏ3๐Ÿ”ฅ2๐Ÿค”1
๐Ÿ˜ˆ [ CravateRouge @rouge_cravate ]

Having an AD with trusts you can reach?
bloodyAD can now retrieve the trusts of the trusts where you can connect to and print them as a nice ascii tree

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ8
๐Ÿ˜ˆ [ Binni Shah @binitamshah ]

Hooking System Calls in Windows 11 22H2 like Avast Antivirus. Research, analysis and bypass : credits @Denis_Skvortcov

๐Ÿ”— https://the-deniss.github.io/posts/2022/12/08/hooking-system-calls-in-windows-11-22h2-like-avast-antivirus.html

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ5๐Ÿ‘1
๐Ÿ˜ˆ [ Jonny Johnson @jsecurity101 ]

Without further ado - here is EtwInspector!

This is a C++ tool to help users interact with ETW providers. This tool supports the enumeration of providers, their events, and capture events.

๐Ÿ”— https://github.com/jsecurity101/ETWInspector

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ‘5
๐Ÿ˜ˆ [ eversinc33 ๐Ÿฉธ๐Ÿ—ก๏ธ @eversinc33 ]

If you are facing an EDR with PEB protection/obf which makes Ldr inaccessible & want to inject shellcode, just pass the VA of LoadLibrary (which is consistent across processes) to the shellcode via egg-hunting from your injector, enabling lib resolution without touching the PEB.

๐Ÿฅ [ tweet ]

*ัะผะตัˆะฝะพะน ัั€ะฐั‡ ะฒ ั‚ั€ะตะดะต*
๐Ÿ”ฅ7๐Ÿ‘1
Offensive Xwitter
*ัะผะตัˆะฝะพะน ัั€ะฐั‡ ะฒ ั‚ั€ะตะดะต*
ะšะฐะบ ัะบั€ะฐัะธั‚ัŒ ัะฒะพะน ะฒะตั‡ะตั€: ะธะดะตะผ ะฒ https://x.com/studentofthings, ะพั‚ะบั€ั‹ะฒะฐะตะผ ะžั‚ะฒะตั‚ั‹, ั‡ะธั‚ะฐะตะผ ั‚ั€ะตะดั‹, ั€ะพั„ะปะธั€ัƒะตะผ.
๐Ÿ”ฅ4๐Ÿ˜3๐Ÿฅฑ2๐Ÿ‘1
๐Ÿ˜ˆ [ VirusTotal @virustotal ]

"YARA is dead, long live YARA-X!" ๐ŸŽ‰

After 15 years, YARA gets a full rewrite in Rust, bringing enhanced performance, security, and user experience.

Dive into the details in latest blog post by @plusvic :

๐Ÿ”— https://blog.virustotal.com/2024/05/yara-is-dead-long-live-yara-x.html

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ8๐Ÿค”1๐Ÿ˜ข1
๐Ÿ˜ˆ [ Thomas Rinsma @thomasrinsma ]

Just released the write-up for CVE-2024-4367, a bug I found recently in PDF.js (and hence in Firefox), resulting in arbitrary JavaScript execution when opening a malicious PDF.

๐Ÿ”— https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/

๐Ÿฅ [ tweet ]
๐Ÿ‘4
๐Ÿ˜ˆ [ Amal Murali @amalmurali47 ]

Just published a blog post on reversing the Git RCE: CVE-2024-32002. It includes my thought process, a working exploit for Mac and Windows, and the PoC GitHub repositories.

๐Ÿ”— https://amalmurali.me/posts/git-rce/

๐Ÿฅ [ tweet ][ quote ]
Forwarded from PT SWARM
๐Ÿงง Our researcher Igor Sak-Sakovskiy has discovered an XXE in Chrome and Safari by ChatGPT!

Bounty: $28,000 ๐Ÿ’ธ

Here is the write-up ๐Ÿ‘‰ https://swarm.ptsecurity.com/xxe-chrome-safari-chatgpt/
๐Ÿคฏ15๐Ÿ‘4๐Ÿฅฑ2๐Ÿค”1
Forwarded from ะ’ะพะปะพัะฐั‚ั‹ะน ะฑัƒะฑะปะธะบ
ัะพะณะปะฐัะตะฝ
๐Ÿ˜32๐Ÿฅฑ3
๐Ÿ˜ˆ [ Lsec @lsecqt ]

I just uploaded a video where I weaponize the code from IconJector via process injection into more legit process than the exporer.exe itself. Hands down to this technique and all credit goes to its creator.

๐Ÿ”— https://www.youtube.com/watch?v=2agrRX4fD_I

๐Ÿฅ [ tweet ]
๐Ÿ‘3
๐Ÿ˜ˆ [ Ptrace Security GmbH @ptracesecurity ]

Nmap Dashboard with Grafana:

๐Ÿ”— https://hackertarget.com/nmap-dashboard-with-grafana/

๐Ÿฅ [ tweet ]

ะฟั€ะธะบะพะปัŒะฝะฐั ะธะดะตั
๐Ÿ‘12๐Ÿค”1
๐Ÿ˜ˆ [ es3n1n @es3n1n ]

i did a thing

๐Ÿ”— https://github.com/es3n1n/no-defender

๐Ÿฅ [ tweet ]

ัะฒะตะถะฐะบ
๐Ÿ”ฅ9
๐Ÿ˜ˆ [ Slowerzs @slowerzs ]

I wrote a blogpost on injecting code into a PPL process on Windows 11, without abusing any vulnerable driver.

๐Ÿ”— https://blog.slowerzs.net/posts/pplsystem/

๐Ÿฅ [ tweet ]
๐Ÿ‘5๐Ÿฅฑ1
๐Ÿ˜ˆ [ slonser @slonser_ ]

My new Research
Email attacks.
- C# 0day
- spoofing emails
e.t.c.

๐Ÿ”— https://blog.slonser.info/posts/email-attacks/

๐Ÿฅ [ tweet ]
๐Ÿ‘10๐Ÿฅฑ2