
Print3M
@Print3M_
Followers
706
Following
630
Media
19
Statuses
126
Red Team operator / programmer. Author of https://t.co/lGsbMY7MZZ
Joined April 2024
Some tips, tricks and thoughts from me about malware delivery via website. Bypassing SWGs and friends. Based on recent redteam engagements. This can be a good starting point for someone. #malware #redteam #security .
print3m.github.io
Techniques used to host malware on a website. Tricks to remember for a good OPSEC. How to build a malicious site.
0
24
116
Oh well.
@PwnFunction I found vibe coding actually slows me down because after all I have to do a refactor and tweaking of everything. Understanding generated code rather than writing was sad. Vibe coding is good when you have no idea what you want to do. Otherwise it's more annoying than helpful.
0
0
4
RT @Oddvarmoe: Many people wanted my slides from the Windows Client Privilege Escalation webinar yesterday. Here are links to the slides aโฆ.
0
124
0
Did you see this epic talk by @stokfredrik & @joohoi at @ekoparty? ๐ฅ Bits flipping, DNS shenanigans, and space radiation โ what more could you ask for? Pure fun.
sectube.tv
Red team bit flipping DNS/TLS domain typos w/ Certainly tool for OAuth cred theft in red team ops. [Joona Hoikkala, STรK // Ekoparty]
0
1
4
Today's SecTube recommendationโ๏ธ Interesting thoughts on shellcode hiding and obfuscation, malware entropy and its impact on EDR evasion during redteam operations ๐ ๐ @MoritzLThomas at @x33fcon . #malware #maldev #redteam.
sectube.tv
Entropy-based .text payload hiding via PECOFF, ASM, shellcode for red team C2 & EDR evasion. [Moritz Laurin Thomas // x33fcon]
0
29
90
RT @Print3M_: Confirm. No Hat is already on SecTube! Serving up 13 unique presentations from the 2024 edition ๐ซก.
sectube.tv
The ultimate collection of IT security event recordings from around the world.
0
2
0
Confirm. No Hat is already on SecTube! Serving up 13 unique presentations from the 2024 edition ๐ซก.
sectube.tv
The ultimate collection of IT security event recordings from around the world.
thanks to @Print3M_, all #NoHat2024 recordings have been categorized & summarized: . Big thanks for making our talks more accessible! Check out their amazing project . #nohat #computer #security #conference #cybersecurity.
0
2
9
Another day, another great recommendation for all OG redteamers out there! A lot of cool โRed Team Tips in 2024โ by @vysecurity at @TheOffensiveX event ๐ฅ Bunch of good advices based on real offensive operations โ.
sectube.tv
Red teams in 2024: AI deepfake phishing, sandbox evasion, Cloudflare C2, domain reputation. [Vincent Yiu // Offensive X]
1
27
104
latest update:.- RSS has been implemented for categories and authors. You can subscribe to your favorite content ๐ฅ.- Monthly membership has been added to "Buy Me A Coffee". Feel free to support;)).- UI tweaks, higher resolution of thumbnails, better.
sectube.tv
The ultimate collection of IT security event recordings from around the world.
1
2
6
@curi0usJack @disobey Damn, just noticed that I tagged the wrong Disobey ๐ Hot fix. CC: @Disobey_fi.
0
0
1
RT @awesomekling: @tsoding itโs not real C++ unless someone is pissed off about how youโre using it.
0
18
0
Must watchโ๏ธToday's SecTube recommendation is special because It's personally one of my favorite talks. I've already watched it probably 3 times;)). Extremely charismatic Jason Lang (@curi0usJack) and his redteam stories, perfect for Friday. @disobey .
sectube.tv
Red team breach analysis: social eng & cred theft, ransomware, Cobalt Strike, lat move, IR. [Jason Lang // Disobey]
4
14
62
BalCCon already on SecTubeโ๏ธ24 new videos at your service. P.S. If you want to see your security conference on SecTube, let's talk in DM ;). @NetMajstor @BalCC0n .
sectube.tv
The ultimate collection of IT security event recordings from around the world.
1
5
12
I highly recommend watching today's SecTube recommendation: "Breach The Gates, Advanced Initial Access Craft 2024". Pure redteam knowledge, no time wasting. Thanks @EmericNasi for this awesome talk! .
sectube.tv
Red team initial access via Windows vulns: VBA, LNK, PDF spoof, MOTW bypass. [Emeric Nasi // Offensive X]
0
12
38