Мир сегодня с "Юрий Подоляка"
Мир сегодня с "Юрий Подоляка"
Труха⚡️Україна
Труха⚡️Україна
Николаевский Ванёк
Николаевский Ванёк
Мир сегодня с "Юрий Подоляка"
Мир сегодня с "Юрий Подоляка"
Труха⚡️Україна
Труха⚡️Україна
Николаевский Ванёк
Николаевский Ванёк
Offensive Twitter avatar

Offensive Twitter

~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337
Disclaimer: https://t.me/OffensiveTwitter/546
Рэйтынг TGlist
0
0
ТыпПублічны
Вертыфікацыя
Не вертыфікаваны
Надзейнасць
Не надзейны
РазмяшчэннеІндія
МоваІншая
Дата стварэння каналаТрав 22, 2022
Дадана ў TGlist
Лист 26, 2024
Прыкрепленая група

Рэкорды

02.04.202523:59
19.1KПадпісчыкаў
06.09.202423:59
0Індэкс цытавання
30.03.202519:08
3.4KАхоп 1 паста
28.02.202519:08
3.4KАхоп рэкламнага паста
24.03.202511:54
6.20%ER
30.03.202519:08
18.03%ERR

Развіццё

Падпісчыкаў
Індэкс цытавання
Ахоп 1 паста
Ахоп рэкламнага паста
ER
ERR
ЖОВТ '24СІЧ '25КВІТ '25

Папулярныя публікацыі Offensive Twitter

😈 [ Wietze @Wietze ]

By making minor changes to command-line arguments, it is possible to bypass EDR/AV detections.

My research, comprising ~70 Windows executables, found that all of them were vulnerable to this, to varying degrees.

Here’s what I found and why it matters:

🔗 https://wietze.github.io/blog/bypassing-detections-with-command-line-obfuscation

🐥 [ tweet ]
18.04.202517:50
😈 [ Florian Roth ⚡️ @cyb3rops ]

Everyone knows Russian hackers don’t use VPNs. They just charge in head-first, use Russian IPs, and leave a calling card in Cyrillic.
Classic ‘на авось’ energy.

🐥 [ tweet ][ quote ]

мы?
15.04.202516:26
😈 [ 0xdf @0xdf_ ]

OS Enumeration CheatSheet! I'll look at using package versions, common ports, and packet TTLs.

🔗 https://0xdf.gitlab.io/cheatsheets/os

🐥 [ tweet ]
Пераслаў з:
vx-underground avatar
vx-underground
28.03.202509:36
😈 [ Oddvar Moe @Oddvarmoe ]

Many people wanted my slides from the Windows Client Privilege Escalation webinar yesterday.

Here are links to the slides and the recording of the webinar.

Slides:
🔗 https://www.slideshare.net/slideshow/windows-client-privilege-escalation-shared-pptx/277239036

Recording:
🔗 https://youtu.be/EG2Mbw2DVnU?si=rlx-GG2QMQpIxQYi

🐥 [ tweet ]
😈 [ Yehuda Smirnov @yudasm_ ]

Excited to release a tool I've been working on lately: ShareFiltrator

ShareFiltrator finds credentials exposed in SharePoint/OneDrive via the Search API (_api/search/query) and also automates mass downloading of the discovered items.

Blog:
🔗 https://blog.fndsec.net/2025/04/02/breaking-down-sharepoint-walls/

Code:
🔗 https://github.com/Friends-Security/sharefiltrator

🐥 [ tweet ]
30.03.202517:54
😈 [ Duncan Ogilvie 🍍 @mrexodia ]

Success! Claude 3.7 with my IDA Pro MCP server managed to solve the crackme that was previously failing🦾

The trick was adding a convert_number tool and stress to always use it for conversions. It took ~7 minutes to run and the cost was $1.85. Also includes an analysis report.

🔗 https://github.com/mrexodia/ida-pro-mcp

🐥 [ tweet ]

рип цтфы категории пвн
06.04.202513:13
😈 [ ippsec @ippsec ]

After using Python for so long, I've been trying to switch to GoLang over the last two years just to try something new. I'm finally somewhat confident in being able to write I'd try to create a video series to help others. This is the first video:

🔗 https://youtu.be/uJFW4c4QE0U

🐥 [ tweet ]
03.04.202520:25
😈 [ Bobby Cooke @0xBoku ]

As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄
Thanks to @d_tranman for his work done on the project and everyone else on the team for making this release happen!

🔗 https://github.com/boku7/Loki

🐥 [ tweet ]
😈 [ NetSPI @NetSPI ]

Microsoft patched critical vulnerabilities (CVE-2025-21299, CVE-2025-29809) in Q1 2025.

NetSPI research reveals Kerberos canonicalization bypasses Hyper-V isolation of credentials, compromising Windows security.

Read the full article:

🔗 https://www.netspi.com/blog/technical-blog/adversary-simulation/cve-2025-21299-cve-2025-29809-unguarding-microsoft-credential-guard/

🐥 [ tweet ]
Увайдзіце, каб разблакаваць больш функцый.