CICADA8Research Profile Banner
CICADA8Research Profile
CICADA8Research

@CICADA8Research

Followers
856
Following
23
Media
5
Statuses
27

Welcome to the official Twitter for CICADA8! Your premier destination for cutting-edge research and development in the cybersecurity field

Joined July 2024
Don't wanna be here? Send us removal request.
@CICADA8Research
CICADA8Research
2 days
🧐 Want to perform a Dependency Confusion attack? Try searching for the following files. I wonder if I was able to collect a complete list of potential dependency files? Do you know any others?.
Tweet media one
0
1
6
@CICADA8Research
CICADA8Research
8 days
Hi Friends! We continue our series of articles about RPC and impacket. In the second part, we looked at tools that can be used to analyze RPC servers, and also examined RPC security issues : ).
Tweet card summary image
cicada-8.medium.com
How to find a RPC server on the system and how to secure that : )
0
33
78
@CICADA8Research
CICADA8Research
19 days
Hello, friends! We started writing a series of articles about Impacket. This will be useful if you have long wanted to understand this tool and create your own tools for Coerce, Lateral Movement and other RPC Abuse :).
Tweet card summary image
cicada-8.medium.com
Learn the basics of RPC, develop a client and server using C++
1
52
156
@CICADA8Research
CICADA8Research
2 months
Read our new article about privilege escalation via SymLinks! You will learn how to abuse arbitrary deletion, copying, overwriting, we will show you a couple of tricks and teach you a new interesting way to bypass UAC :).
Tweet card summary image
cicada-8.medium.com
How to achieve LPE in Windows via symlinks and how we wrote an exploit for Anydesk :)
1
18
57
@CICADA8Research
CICADA8Research
5 months
Hi friends! We would like to share with you our new article in which we look at various non-standard ways to use ADCS certificates in Windows AD 🧐.
Tweet card summary image
cicada-8.medium.com
What do with a certificate in a Windows AD environment? How to get the most out of a single pfx file? The answers are in article
0
21
59
@CICADA8Research
CICADA8Research
6 months
Hello friends! There is a lot of information about Kerberos Relay out and it is easy to get confused! That's why we have created a small MindMap to help you understand Kerberos Relay. U can find PDF/HTML/PNG version here:.
Tweet media one
4
91
291
@CICADA8Research
CICADA8Research
7 months
Hi friends, Recently @mansk1es presented his research about LPE in AnyDesk (CVE-2024-12754). Our team developed a POC on this vulnerability😀. Check it here:.
Tweet media one
0
61
191
@CICADA8Research
CICADA8Research
8 months
▎SpyWare 2.0 🔍. Read our new research and learn about MS UIA technology. You will explore the depths of COM, graphical elements in Windows and spy on WhatsApp, Telegram, Slack, and Keepass. 🕵️‍♂️💻. Tool:.
Tweet card summary image
github.com
COM ViewLogger — new malware keylogging technique. Contribute to CICADA8-Research/Spyndicapped development by creating an account on GitHub.
2
68
167
@CICADA8Research
CICADA8Research
9 months
Rogue OpenVpn and WireGuard! 🧭. Still sending docm macros? Reconsider your phishing scripts! Send openvpn and wireguard configurations! U can easily achieve command exec using VPN : ). Examples here:.
Tweet media one
Tweet media two
1
73
263
@CICADA8Research
CICADA8Research
10 months
Hello everyone! Our team loves everything related to LPE exploits. However, there is no publicly available list on the web with fresh LPE exploits (2023-2024) for Windows. However, we do have such a list. And we are sharing it with you!.
Tweet card summary image
github.com
Complete list of LPE exploits for Windows (starting from 2023) - MzHmO/Exploit-Street
8
151
485
@CICADA8Research
CICADA8Research
10 months
Hi! We'd like to share our new research with you. You've probably heard about COM Hijacking, but we've found another way of persistence via COM. Typelib! Read the article here:.
1
49
95
@CICADA8Research
CICADA8Research
1 year
Do you want to start researching COM? We've created a set of tools to make it easy to find LPEs via COM in Windows!. Check it here:.
Tweet media one
0
2
15
@CICADA8Research
CICADA8Research
1 year
Our new article about privilege escalation via vulnerable MSI files. All roads lead to NT AUTHORIRTY\SYSTEM :).
Tweet card summary image
github.com
Analyse MSI files for vulnerabilities. Contribute to CICADA8-Research/MyMSIAnalyzer development by creating an account on GitHub.
0
5
9
@CICADA8Research
CICADA8Research
1 year
Hi friends, we felt that the topic of in-memory payload execution was not covered enough, so we've collected our own notes and hacks that we use on pentests to execute in-memory (reflective) payloads. Enjoy reading!.
Tweet card summary image
cicada-8.medium.com
Everything OSEP didn’t tell you. How to execute payloads in memory and bypass antivirus.
0
3
5
@CICADA8Research
CICADA8Research
1 year
Process Injection is Dead. Long Live IHxHelpPaneServer . How can a user's session be abused without process injection, remotekrbrelay, tgsthief?. Read it in our new article:. POC:.
Tweet card summary image
github.com
Process injection alternative. Contribute to CICADA8-Research/IHxExec development by creating an account on GitHub.
0
1
4
@CICADA8Research
CICADA8Research
1 year
New article posted! 😀. From HTTP to RCE. How to leave backdoor in IIS . Read it here:.
Tweet card summary image
cicada-8.medium.com
I will show the way of persistence on a target system using legitimate Microsoft product being Internet Information Services.
0
0
3
@CICADA8Research
CICADA8Research
1 year
Hi friends, this is the CICADA8 research department's Twitter account. Here we will share our articles and tools for penetration testing.
0
0
0