PatchRequest Profile Banner
PatchRequest Profile
PatchRequest

@PatchRequest

Followers
84
Following
186
Media
22
Statuses
126

Offsec | Reptiles and other fun stuff

Deutschland
Joined July 2019
Don't wanna be here? Send us removal request.
@PatchRequest
PatchRequest
4 years
Currently analyzing the leaks regarding conti gang. Found a file with a Mega account. PW is in the file too. I think I should not log into it right? :D.
1
0
1
@PatchRequest
PatchRequest
19 days
Wrote a Windows kernel driver in Rust to read and write memory on request from a userland program, was pretty fun. I can recommend the Rust kernel Series from @0xfluxsec .
Tweet media one
0
3
11
@PatchRequest
PatchRequest
1 month
Just open-sourced my Rust-based Mythic agent. Huge thanks to @MalDevAcademy and @5mukx for the inspiration (and some solid code)! 🚀🦀.
0
0
4
@PatchRequest
PatchRequest
1 month
Just implemented a pivot system where one agent can start listening on a port, and other agents can use that port for external connections to build redirector chains in restricted networks. It's quite fun to build a #C2 agent, I have to say :)
Tweet media one
0
0
1
@PatchRequest
PatchRequest
2 months
Just added that it can execute .NET applications in memory. Any ideas for other must-have features?
Tweet media one
0
0
0
@PatchRequest
PatchRequest
2 months
My Mythic Rust Agent now runs BOFs, together with the SOCKS Proxy it provides over the Teamserver it is basically able to do everything :)
Tweet media one
0
0
1
@PatchRequest
PatchRequest
2 months
The current version has almost no detections. Nice
Tweet media one
0
0
1
@PatchRequest
PatchRequest
2 months
My custom Mythic agent now supports SOCKS. It was a bit janky to build at first, but I'm quite happy with it now :)
Tweet media one
1
0
0
@PatchRequest
PatchRequest
2 months
Started a few days ago writing a Mythic agent in C for fun. Made some small progress—basic callback and inline shellcode execution :) Next step: dive into @vxunderground and read some fun stuff to implement.
Tweet media one
0
0
0
@PatchRequest
PatchRequest
4 months
RT @CerastIntel: 🚀 Big Update Coming in April!. We’re relaunching end of April 2025 with powerful new features:. 🔍 Full Database Search – F….
0
1
0
@PatchRequest
PatchRequest
6 months
RT @CerastIntel: Found a leaked .env file during testing today — critical reminder to check for sensitive data exposure. 🚨 .Want to find it….
0
1
0
@PatchRequest
PatchRequest
8 months
RT @CerastIntel: Super cool story about hacking hackers! 😎 Read it, learn from it, and definitely don’t try this yourself (or maybe do).….
0
1
0
@PatchRequest
PatchRequest
8 months
RT @CerastIntel: 🚨 Heads up, devs! A malicious commit hit the lottie-player repo, causing pop-ups linked to a crypto scam. If you're using….
0
13
0
@PatchRequest
PatchRequest
1 year
Hey @MalDevAcademy , currently thinking about buying the course. Is the content valid for Windows for ARM too? Shellcode might not be transferable, but the code and techniques should work on ARM64, right?.
0
0
1
@PatchRequest
PatchRequest
1 year
RT @CerastIntel: Check out the latest security findings at 🚨. We uncover issues such as exposed keys/secrets/confi….
0
1
0
@PatchRequest
PatchRequest
1 year
RT @CerastIntel: Want some free loot? Here a free first month: FREELOOT100
Tweet media one
0
1
0
@PatchRequest
PatchRequest
2 years
RT @NexusFuzzy: Well, I'm not advising you to do this but a lot of #Redline #Infostealer Command & Control servers have RDP exposed to the….
0
49
0
@PatchRequest
PatchRequest
3 years
I am happy about every feedback and/or idea for the future of this project!.
0
0
0
@PatchRequest
PatchRequest
3 years
The Operator of the UI never gets to see the full cracked password, and it is not stored anywhere.
1
0
0
@PatchRequest
PatchRequest
3 years
The given account performance a #DCSync with impacket from @SecureAuth, so the account needs the permissions for synchronizations.
1
0
0
@PatchRequest
PatchRequest
3 years
@hashcat is running with a standart wordlist and OneRuleToRuleThemAll from @notsosecure. You can exchange these files as you like or add custom words with the UI.
1
0
0