Burnout

1.4K posts

Burnout banner
Burnout

Burnout

@BurnOneOuts

Buy High and Sell Low

Katılım Eylül 2021
1.2K Takip Edilen186 Takipçiler
Burnout retweetledi
Jakob
Jakob@virtualloc·
Another day, another async BOF. With KeeLog, you can monitor KeePass instances and capture the master password as soon as its entered. github.com/jakobfriedl/ke…
Jakob tweet media
English
0
24
73
3.5K
Burnout retweetledi
Jakob
Jakob@virtualloc·
Been very interested in Async BOFs lately and implemented a few for use with Conquest. The first implements Rubeus monitor as a BOF and notifies when TGTs are collected. The second monitors for clipboard changes and returns them. github.com/jakobfriedl/tg… github.com/jakobfriedl/cl…
English
0
22
73
3.2K
Burnout retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
Me trying to figure out Agent Identities in Entra ID. I really wonder who decided apps and service principals weren't already difficult enough to understand and went with a design that is even wayyy more complicated 😅.
GIF
English
16
7
139
9.5K
Burnout retweetledi
Omkar
Omkar@psomkar1·
Interviewer : where do you see yourself in 5 years ? Me :
Omkar tweet media
English
219
3.5K
35.1K
978.1K
Burnout retweetledi
SpecterOps
SpecterOps@SpecterOps·
NTLMv1 is still out there. And now it’s easier than ever to break. @skylerknecht walks through how Google’s rainbow tables make NT hash recovery practical, no third-party service required. Check it out! ⤵️ ghst.ly/4vqx9Id
English
3
63
160
7.8K
Burnout retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
Releasing one of my research tools: EVENmonitor🖥️ Inspired by LDAPmonitor, I implemented a monitoring tool for the Windows Event log in pure python. You can just attach it via the network and then filter for specific event IDs or keywords. Available at: github.com/NeffIsBack/EVE…
GIF
English
4
72
259
28.5K
Burnout retweetledi
Fernando Fernandez
Fernando Fernandez@FinFerFer·
@Dinosn With Microsoft disabling RC4 for Kerberos come summer, will that affect Ntlmv2 or will it stick around for a few more iterations?
English
0
1
1
670
Burnout retweetledi
kmkz
kmkz@kmkz_security·
Example on what real-world #LLM usage in offsec looks like: Built a full-stack #C2 100% usable: .HTTP + DNS fallback .jittered traffic, real UAs .WS SOCKS5 pivot .on-demand modules, no persistence LLMs didn’t design it, they accelerate Experience drives tradecraft, #LLMs amplify
kmkz tweet mediakmkz tweet mediakmkz tweet mediakmkz tweet media
English
3
14
66
6.4K
Burnout retweetledi
Nicolas Krassas
Nicolas Krassas@Dinosn·
Every Sliver C2 Tutorial Was Outdated. So I Wrote My Own @aviraj3868/every-sliver-c2-tutorial-was-outdated-so-i-wrote-my-own-cd47c50add3f" target="_blank" rel="nofollow noopener">medium.com/@aviraj3868/ev…
English
3
39
218
14.5K
Burnout retweetledi
Co11ateral
Co11ateral@co11ateral·
LDAPNomNom Can quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by abusing LDAP Ping requests (cLDAP). No Windows audit logs generated. High speed ~ up to 50K/sec per server. You can go way beyond that with multiple servers in parallel github.com/lkarlslund/lda…
English
0
14
57
3.2K
Burnout retweetledi
mthcht
mthcht@mthcht2·
ICMP data exfiltration is underestimated. #tool=ICMP%20Exfiltration%20%2F%20C2%20Tunneling" target="_blank" rel="nofollow noopener">lolexfil.github.io/#tool=ICMP%20E… ICMP traffic is often excluded from firewall log ingestion, and on endpoints most EDRs neither alert on this exfiltration method nor expose the ICMP payload content needed to build custom detections.
mthcht@mthcht2

LOLEXFIL Living off the land Data Exfiltration method lolexfil.github.io

English
2
20
104
9.4K
Burnout retweetledi
Cloudflare Developers
Cloudflare Developers@CloudflareDev·
Introducing the new /crawl endpoint - one API call and an entire site crawled. No scripts. No browser management. Just the content in HTML, Markdown, or JSON.
Cloudflare Developers tweet media
English
768
1.7K
19.8K
10.6M
Burnout retweetledi
Origin
Origin@originhq·
We built Brainworm: malware that lives entirely inside of an AI agent's context window. No binaries. No scripts. Once loaded, it registers with C2 and executes tasks using the agent's own tools. Welcome to the era of semantic malware. 🧠🪱 Blog: originhq.com/blog/brainworm
English
28
198
823
115.5K
Burnout retweetledi
OtterHacker
OtterHacker@OtterHacker·
I published a Sharepoint and Outlook PowerShell GUI that can be used on RedTeam operation when you've found an Azure AppId with interesting privileges. You can now use these tools to browse the SharePoint or Mailboxes through a GUI instead the GraphAPI github.com/OtterHacker/M3…
English
2
95
318
15.9K