noodlearms (@infosecnoodle) 's Twitter Profile
noodlearms

@infosecnoodle

ID: 1229074865749184513

linkhttp://infosecnoodle.com calendar_today16-02-2020 16:08:21

30 Tweet

165 Followers

266 Following

V3ded (@v3ded) 's Twitter Profile Photo

I just published a new blog post on (offensive) Windows kernel driver development. Hoping to make this into a nice series. Let me know what you think 😁! v3ded.github.io/redteam/red-te… #redteam #infosec

Janggggg (@testanull) 's Twitter Profile Photo

Hey look, I've just found a seRioUs vulnerability in Java System.out.println() method Just by executing System.out.println() with a malicious Object with the method toString() is override, our mAlicIous code will get executed remotely ( ͡° ͜ʖ ͡°)

Hey look, I've just found a seRioUs vulnerability in Java System.out.println() method
Just by executing System.out.println() with a malicious Object with the method toString() is override, our mAlicIous code will get executed remotely ( ͡° ͜ʖ ͡°)
Simon Mcnamee (@mcnamee_simon) 's Twitter Profile Photo

I know it's that time of year we all set out with lofty goals to achieve great things, but if there's anyone out there looking for a good cause to support whilst doing so.. let me suggest reunite ICAC 1/4

William Burgess (@joehowwolf) 's Twitter Profile Photo

New CS Blog - Revisiting the UDRL Part 3: cobaltstrike.com/blog/revisitin… If you like the idea of loading a custom c2 channel in your UDRL then this blog may be of interest 👀

RWXstoned (@rwxstoned) 's Twitter Profile Photo

An example of custom Sleep in the new Cobalt Strike framework, reusing Sleepmask-VS. Hopefully clarifying how BeaconGate, Sleepmask, and Beacon Userdata all fit together! rwxstoned.github.io/2024-11-13-Cob…

Rasta Mouse (@_rastamouse) 's Twitter Profile Photo

[BLOG] This post summarises how to tie Cobalt Strike's UDRL, SleepMask, and BeaconGate together for your syscall and call stack spoofing needs. rastamouse.me/udrl-sleepmask…

Jack Halon (@jack_halon) 's Twitter Profile Photo

Back in 2018, I released a post on how to break into pentesting, and it's been shared widely in the security community ever since. With so many changes in the field, I've reworked the post to reflect current standards and answer more questions. Enjoy! jhalon.github.io/breaking-into-…

Matt Eidelberg (@tyl0us) 's Twitter Profile Photo

Been super busy with some secret things but SoucePoint 4.0 is live with all the latest CS stuff github.com/Tylous/SourceP… #redteam #CobaltStrike

Steve S. (@0xtriboulet) 's Twitter Profile Photo

Been thinking about the acceptance of BOFs as the goto development platform for capability development. From their inception, BOFs were intended to behave as a short inline-execution capability that extended the integral functionality of your C2 agent. The “inline-execution” part

HackerRalf (@hacker_ralf) 's Twitter Profile Photo

AdaptixC2 v0.4 is out github.com/Adaptix-Framew… * New Linux/MacOS "gopher" agent * TCP/mTLS external listener for "gopher" agent * New internal TCP listener for "beacon" agent * Screenshot storage Changelog: adaptix-framework.gitbook.io/adaptix-framew…

AdaptixC2 v0.4 is out

github.com/Adaptix-Framew…

* New Linux/MacOS "gopher" agent
* TCP/mTLS external listener for "gopher" agent
* New internal TCP listener for "beacon" agent
* Screenshot storage

Changelog: adaptix-framework.gitbook.io/adaptix-framew…
noodlearms (@infosecnoodle) 's Twitter Profile Photo

Short post on an alternative method for obtaining Microsoft Entra refresh tokens via Beacon. Proof of concept BOF is available on my GitHub 🙂 infosecnoodle.com/p/obtaining-mi…

Steve S. (@0xtriboulet) 's Twitter Profile Photo

rssh-rs is a reflective DLL that performs some hacky integration with your favorite C2 Framework to provide SSH session access from a Beacon session. github.com/0xTriboulet/rs…

Yuval Gordon (@yug0rd) 's Twitter Profile Photo

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…
William Burgess (@joehowwolf) 's Twitter Profile Photo

[BLOG] Dynamically Instrumenting Beacon with BeaconGate - For All Your Call Stack Spoofing Needs! cobaltstrike.com/blog/instrumen…

Rasta Mouse (@_rastamouse) 's Twitter Profile Photo

Having another look at Raffi's Crystal Palace PIC loaders today. This time as a post-ex reflective loader with embedded function pointers for GetModuleHandle & GetProcAddress.

Having another look at Raffi's Crystal Palace PIC loaders today.  This time as a post-ex reflective loader with embedded function pointers for GetModuleHandle & GetProcAddress.