MSec Operations Profile
MSec Operations

@MSecOps

Followers
1K
Following
13
Media
18
Statuses
21

Germany
Joined July 2024
Don't wanna be here? Send us removal request.
@MSecOps
MSec Operations
1 year
πŸ”₯ Introducing RustPack πŸ”₯ . RustPack is an evasive Packer/Loader, that is capable of bypassing common AV/EDR vendors. It accepts user-provided known malicious input payloads, such as shellcode, C# assemblies or portable executables (PE). Those inputs are encrypted, and
Tweet media one
3
62
288
@MSecOps
MSec Operations
1 month
Creating COM hijacking payloads has never been easier than with RustPack! With COM Hijacking, you can persist on a target system by 'living' in trusted user processes, such as the Chrome browser. You only need to bring one DLL. When the user opens Chrome, for example, a C2
0
18
77
@grok
Grok
5 days
What do you want to know?.
328
203
1K
@MSecOps
MSec Operations
3 months
Rumour has it that Jonas Lykkegaard's self-delete technique doesn't work on Windows 11 anymore. Well, the original proof of concept (PoC) does not, but slight modifications bring this technique back to Win11!😎. With #RustPack, you can easily generate self-deleting executables or
1
20
97
@MSecOps
MSec Operations
4 months
And yes, out custom Ruy-Lopez technique even works perfectly fine for e.G. DLLs that are run via rundll32.exe. Same works for sideloading DLLs, and so on. 😎
0
4
12
@MSecOps
MSec Operations
4 months
The Ruy-Lopez technique sometimes helps a lot with evasion. The technique was published and open sourced by our founder @Shitsecure two years ago. In #RustPack version 1.3.1 we added a custom, non-public version of this technique that is much more OPSec safe than the public
2
16
66
@MSecOps
MSec Operations
4 months
#RustPack version 1.3.0 has been released today. This version includes (again) minor changes to the final payload metadata to remove various potential IoCs. πŸ”₯πŸ”₯ . For example, most packers use some kind of string based encoding to reduce entropy, such as the well-known UUID,
Tweet media one
0
3
19
@MSecOps
MSec Operations
5 months
In one of our previous videos we demonstrated how to generate sideloading binaries by cloning the exports of an existing DLL to forward them - . However, using Microsoft DLLs and Microsoft-signed binaries is not the best OPsec, as it's easy for EDR
@MSecOps
MSec Operations
7 months
How do you create your payloads in 2025? At MSec Operations we prefer to use DLL sideloading for EDR evasion. This technique allows our malicious code to run within a signed, legitimate executable. Combining this technique with other useful techniques will provide stable
0
29
121
@MSecOps
MSec Operations
6 months
#RustPack Version 1.2.0 is now released for our customers. The biggest change was to add full DInvoke support for all payloads. The import table now won't show the Windows APIs being used anymore, instead by default random non malicious imports are added in here to make payloads
Tweet media one
0
5
32
@MSecOps
MSec Operations
7 months
How do you create your payloads in 2025? At MSec Operations we prefer to use DLL sideloading for EDR evasion. This technique allows our malicious code to run within a signed, legitimate executable. Combining this technique with other useful techniques will provide stable
8
52
234
@MSecOps
MSec Operations
8 months
The next version of #RustPack will not expose any of it's used imports anymore πŸ”₯πŸ”₯πŸ”₯. Instead, there will be random friendly looking imports for each payload. Only if the operators really want to they can still go for zero imports. Just because it's possible.πŸ™‚
Tweet media one
0
2
15
@MSecOps
MSec Operations
9 months
The simplest use case for #RustPack: Packing shellcode into an unsigned executable. RustPack is an Windows executable, which can be used offline. It takes the input file (in this case Havoc shellcode) and builds an executable output format, which will decrypt and execute the
0
9
56
@MSecOps
MSec Operations
10 months
πŸ”₯πŸ”₯The first new #RustPack version 1.1 was just sent to our customers. πŸ”₯πŸ”₯.________________________.Changes include:.- A killdate can now be set, after that date payloads won't fire anymore.- The operator can specify the host binary, in which the payload will fire. It will only
Tweet media one
1
3
30
@MSecOps
MSec Operations
11 months
Bonus: This of course also works for generated DLL files. So you can run the interactive Powershell from within rundll32.exe or any sideloading binary of your choice with a console. This get's you around e.G. Applocker restrictions.🀠
1
0
11
@MSecOps
MSec Operations
11 months
Another super handy feature for Pentesters is the interactive Powershell. Whenever you have a project where you have interactive access to a desktop environment, you may want to stick to the offensive Powershell tooling. In this case, #RustPack can generate an executable for you
3
33
181
@MSecOps
MSec Operations
1 year
One more cool thing about #RustPack is, that you can create DLLs, which still return console output to the Operator. This can be used, to for example execute C# binaries from within rundll32.exe or other processes - still getting the file output as usual. πŸ”₯. So for Pentesters
0
20
104
@MSecOps
MSec Operations
1 year
Entropy based detections are not a problem at all for #RustPack. All payloads by default end up in a normal to low overall entropy value. And the operator can on top choose between alternative payload encoding options. 😎. Alternatively, you can de-couple the encrypted payload
Tweet media one
@MSecOps
MSec Operations
1 year
πŸ”₯ Introducing RustPack πŸ”₯ . RustPack is an evasive Packer/Loader, that is capable of bypassing common AV/EDR vendors. It accepts user-provided known malicious input payloads, such as shellcode, C# assemblies or portable executables (PE). Those inputs are encrypted, and
Tweet media one
0
2
26
@MSecOps
MSec Operations
1 year
RT @RedTeamTactics: Definitely recommend this! I used the NimSyscallPackerand by @ShitSecure and it was a game-changer. Imagine what the R….
0
3
0