CICADA8Research
@CICADA8Research
Followers
877
Following
24
Media
5
Statuses
27
Welcome to the official Twitter for CICADA8! Your premier destination for cutting-edge research and development in the cybersecurity field
Joined July 2024
🧐 Want to perform a Dependency Confusion attack? Try searching for the following files. I wonder if I was able to collect a complete list of potential dependency files? Do you know any others? https://t.co/N3V75WdTEx
1
1
7
Hi Friends! We continue our series of articles about RPC and impacket. In the second part, we looked at tools that can be used to analyze RPC servers, and also examined RPC security issues : ) https://t.co/f2pIOOMzaf
cicada-8.medium.com
How to find a RPC server on the system and how to secure that : )
0
34
85
Hello, friends! We started writing a series of articles about Impacket. This will be useful if you have long wanted to understand this tool and create your own tools for Coerce, Lateral Movement and other RPC Abuse :)
cicada-8.medium.com
Learn the basics of RPC, develop a client and server using C++
1
52
158
Read our new article about privilege escalation via SymLinks! You will learn how to abuse arbitrary deletion, copying, overwriting, we will show you a couple of tricks and teach you a new interesting way to bypass UAC :) https://t.co/7sOASGMVq2
cicada-8.medium.com
How to achieve LPE in Windows via symlinks and how we wrote an exploit for Anydesk :)
1
18
57
Hi friends! We would like to share with you our new article in which we look at various non-standard ways to use ADCS certificates in Windows AD 🧐 https://t.co/ySF4YBpW03
cicada-8.medium.com
What do with a certificate in a Windows AD environment? How to get the most out of a single pfx file? The answers are in article
0
21
59
Hello friends! There is a lot of information about Kerberos Relay out and it is easy to get confused! That's why we have created a small MindMap to help you understand Kerberos Relay U can find PDF/HTML/PNG version here: https://t.co/9sOm5MsdLN
4
90
291
Hi friends, Recently @mansk1es presented his research about LPE in AnyDesk (CVE-2024-12754). Our team developed a POC on this vulnerability😀 Check it here: https://t.co/WPbwiUbLsS
0
60
189
▎SpyWare 2.0 🔍 Read our new research and learn about MS UIA technology. You will explore the depths of COM, graphical elements in Windows and spy on WhatsApp, Telegram, Slack, and Keepass. 🕵️♂️💻 https://t.co/1WzeCj2suL Tool: https://t.co/cDFiSttzQ0
github.com
COM ViewLogger — new malware keylogging technique. Contribute to CICADA8-Research/Spyndicapped development by creating an account on GitHub.
2
66
163
Rogue OpenVpn and WireGuard! 🧭 Still sending docm macros? Reconsider your phishing scripts! Send openvpn and wireguard configurations! U can easily achieve command exec using VPN : ) Examples here: https://t.co/x47IgZx7jl
1
70
259
Hello everyone! Our team loves everything related to LPE exploits. However, there is no publicly available list on the web with fresh LPE exploits (2023-2024) for Windows. However, we do have such a list. And we are sharing it with you! https://t.co/vZwah6erOy
github.com
Complete list of LPE exploits for Windows (starting from 2023) - MzHmO/Exploit-Street
8
149
479
Hi! We'd like to share our new research with you. You've probably heard about COM Hijacking, but we've found another way of persistence via COM. Typelib! Read the article here: https://t.co/UNujo5gwzU
1
47
95
Do you want to start researching COM? We've created a set of tools to make it easy to find LPEs via COM in Windows! Check it here: https://t.co/Y3aG7IJaaj
0
2
15
Our new article about privilege escalation via vulnerable MSI files. All roads lead to NT AUTHORIRTY\SYSTEM :) https://t.co/8mluQ01MxO
https://t.co/n7yJ39axVy
github.com
Analyse MSI files for vulnerabilities. Contribute to CICADA8-Research/MyMSIAnalyzer development by creating an account on GitHub.
0
5
9
Hi friends, we felt that the topic of in-memory payload execution was not covered enough, so we've collected our own notes and hacks that we use on pentests to execute in-memory (reflective) payloads. Enjoy reading! https://t.co/G5RMzDuiKx
cicada-8.medium.com
Everything OSEP didn’t tell you. How to execute payloads in memory and bypass antivirus.
0
3
5
Process Injection is Dead. Long Live IHxHelpPaneServer How can a user's session be abused without process injection, remotekrbrelay, tgsthief? Read it in our new article: https://t.co/w259d3Je2R POC: https://t.co/7p9rWt0SNH
github.com
Process injection alternative. Contribute to CICADA8-Research/IHxExec development by creating an account on GitHub.
0
1
4
New article posted! 😀 From HTTP to RCE. How to leave backdoor in IIS Read it here: https://t.co/YgquKHsT5Y
cicada-8.medium.com
I will show the way of persistence on a target system using legitimate Microsoft product being Internet Information Services.
0
0
4
Hi friends, this is the CICADA8 research department's Twitter account. Here we will share our articles and tools for penetration testing
0
0
0