Print3M_ Profile Banner
Print3M Profile
Print3M

@Print3M_

Followers
706
Following
630
Media
19
Statuses
126

Red Team operator / programmer. Author of https://t.co/lGsbMY7MZZ

Joined April 2024
Don't wanna be here? Send us removal request.
@Print3M_
Print3M
4 months
Some tips, tricks and thoughts from me about malware delivery via website. Bypassing SWGs and friends. Based on recent redteam engagements. This can be a good starting point for someone. #malware #redteam #security .
Tweet card summary image
print3m.github.io
Techniques used to host malware on a website. Tricks to remember for a good OPSEC. How to build a malicious site.
0
24
116
@Print3M_
Print3M
4 days
Highly recommend this one ๐Ÿ’ฏ.
@ShitSecure
S3cur3Th1sSh1t
5 days
For anyone interested, Offensive COM hijacking is now available on YouTube. ๐Ÿค .
Tweet media one
0
0
1
@Print3M_
Print3M
11 days
Oh well.
Tweet media one
@Print3M_
Print3M
25 days
@PwnFunction I found vibe coding actually slows me down because after all I have to do a refactor and tweaking of everything. Understanding generated code rather than writing was sad. Vibe coding is good when you have no idea what you want to do. Otherwise it's more annoying than helpful.
0
0
4
@Print3M_
Print3M
3 months
RT @LetsDefendIO: Enter to BIOS
0
565
0
@Print3M_
Print3M
4 months
Did you guys know that you can hide a secret message in a standard emoji?๐Ÿ˜Ž๓ „น๓ „๓ …˜๓ …‘๓ …ฆ๓ …•๓ „๓ …ž๓ …Ÿ๓ „๓ …™๓ …”๓ …•๓ …‘๓ „๓ …˜๓ …Ÿ๓ …ง๓ „๓ …™๓ …ค๓ „๓ …ง๓ …Ÿ๓ …ข๓ …›๓ …ฃ๓ „ž.
0
1
5
@Print3M_
Print3M
4 months
RT @Oddvarmoe: Many people wanted my slides from the Windows Client Privilege Escalation webinar yesterday. Here are links to the slides aโ€ฆ.
0
124
0
@Print3M_
Print3M
5 months
Did you see this epic talk by @stokfredrik & @joohoi at @ekoparty? ๐Ÿ”ฅ Bits flipping, DNS shenanigans, and space radiation โ€“ what more could you ask for? Pure fun.
Tweet card summary image
sectube.tv
Red team bit flipping DNS/TLS domain typos w/ Certainly tool for OAuth cred theft in red team ops. [Joona Hoikkala, STร–K // Ekoparty]
0
1
4
@Print3M_
Print3M
5 months
Today's SecTube recommendationโ—๏ธ Interesting thoughts on shellcode hiding and obfuscation, malware entropy and its impact on EDR evasion during redteam operations ๐Ÿ‘€ ๐Ÿ‘ @MoritzLThomas at @x33fcon . #malware #maldev #redteam.
Tweet card summary image
sectube.tv
Entropy-based .text payload hiding via PECOFF, ASM, shellcode for red team C2 & EDR evasion. [Moritz Laurin Thomas // x33fcon]
0
29
90
@Print3M_
Print3M
5 months
RT @Print3M_: Confirm. No Hat is already on SecTube! Serving up 13 unique presentations from the 2024 edition ๐Ÿซก.
Tweet card summary image
sectube.tv
The ultimate collection of IT security event recordings from around the world.
0
2
0
@Print3M_
Print3M
5 months
Confirm. No Hat is already on SecTube! Serving up 13 unique presentations from the 2024 edition ๐Ÿซก.
Tweet card summary image
sectube.tv
The ultimate collection of IT security event recordings from around the world.
@nohatcon
No Hat Con
5 months
thanks to @Print3M_, all #NoHat2024 recordings have been categorized & summarized: . Big thanks for making our talks more accessible! Check out their amazing project . #nohat #computer #security #conference #cybersecurity.
0
2
9
@Print3M_
Print3M
5 months
Another day, another great recommendation for all OG redteamers out there! A lot of cool โ€œRed Team Tips in 2024โ€ by @vysecurity at @TheOffensiveX event ๐Ÿ”ฅ Bunch of good advices based on real offensive operations โ—.
Tweet card summary image
sectube.tv
Red teams in 2024: AI deepfake phishing, sandbox evasion, Cloudflare C2, domain reputation. [Vincent Yiu // Offensive X]
1
27
104
@Print3M_
Print3M
5 months
I forgot about the new โ€œshareโ€ button under each video! Now you can easily share your favorite talk to your friends and followers :).
0
0
1
@Print3M_
Print3M
5 months
latest update:.- RSS has been implemented for categories and authors. You can subscribe to your favorite content ๐Ÿ”ฅ.- Monthly membership has been added to "Buy Me A Coffee". Feel free to support;)).- UI tweaks, higher resolution of thumbnails, better.
Tweet card summary image
sectube.tv
The ultimate collection of IT security event recordings from around the world.
1
2
6
@Print3M_
Print3M
5 months
@curi0usJack @disobey Damn, just noticed that I tagged the wrong Disobey ๐Ÿ˜„ Hot fix. CC: @Disobey_fi.
0
0
1
@Print3M_
Print3M
5 months
RT @awesomekling: @tsoding itโ€™s not real C++ unless someone is pissed off about how youโ€™re using it.
0
18
0
@Print3M_
Print3M
5 months
Must watchโ—๏ธToday's SecTube recommendation is special because It's personally one of my favorite talks. I've already watched it probably 3 times;)). Extremely charismatic Jason Lang (@curi0usJack) and his redteam stories, perfect for Friday. @disobey .
Tweet card summary image
sectube.tv
Red team breach analysis: social eng & cred theft, ransomware, Cobalt Strike, lat move, IR. [Jason Lang // Disobey]
4
14
62
@Print3M_
Print3M
5 months
BalCCon already on SecTubeโ—๏ธ24 new videos at your service. P.S. If you want to see your security conference on SecTube, let's talk in DM ;). @NetMajstor @BalCC0n .
Tweet card summary image
sectube.tv
The ultimate collection of IT security event recordings from around the world.
1
5
12
@Print3M_
Print3M
5 months
I highly recommend watching today's SecTube recommendation: "Breach The Gates, Advanced Initial Access Craft 2024". Pure redteam knowledge, no time wasting. Thanks @EmericNasi for this awesome talk! .
Tweet card summary image
sectube.tv
Red team initial access via Windows vulns: VBA, LNK, PDF spoof, MOTW bypass. [Emeric Nasi // Offensive X]
0
12
38
@Print3M_
Print3M
5 months
Almost 3k visitors on SecTube within 24 hours. Thank you, everybody! Infosec community is doing well. Stay tuned for updates: more content, more features soon! ๐Ÿ”ฅ๐Ÿšจ.
1
2
11