S3cur3Th1sSh1t Profile
S3cur3Th1sSh1t

@ShitSecure

Followers
26K
Following
4K
Media
286
Statuses
3K

Pentesting, scripting, pwning!

127.0.0.1
Joined January 2019
Don't wanna be here? Send us removal request.
@ShitSecure
S3cur3Th1sSh1t
1 year
This year it happened. What started as a spare time hobby and fun project became a commercial product for the Offensive Security community. I founded a company, @MSecOps . And this company will sell a Packer to Red Teams or Pentesters. (1/x) 🔥.
@MSecOps
MSec Operations
1 year
🔥 Introducing RustPack 🔥 . RustPack is an evasive Packer/Loader, that is capable of bypassing common AV/EDR vendors. It accepts user-provided known malicious input payloads, such as shellcode, C# assemblies or portable executables (PE). Those inputs are encrypted, and
Tweet media one
137
116
294
@ShitSecure
S3cur3Th1sSh1t
1 day
RT @Synacktiv: The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: Thi….
Tweet card summary image
github.com
Group Policy Objects manipulation and exploitation framework - synacktiv/GroupPolicyBackdoor
0
86
0
@ShitSecure
S3cur3Th1sSh1t
1 day
RT @CICADA8Research: Hi Friends! We continue our series of articles about RPC and impacket. In the second part, we looked at tools that can….
Tweet card summary image
cicada-8.medium.com
How to find a RPC server on the system and how to secure that : )
0
25
0
@ShitSecure
S3cur3Th1sSh1t
3 days
RT @_dirkjan: If you didn't find my Black Hat / Def Con slides yet, they are available on . Also includes the demo….
dirkjanm.io
0
68
0
@ShitSecure
S3cur3Th1sSh1t
4 days
RT @0xthirteen: I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it .
Tweet card summary image
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
0
55
0
@ShitSecure
S3cur3Th1sSh1t
4 days
RT @netbiosX: Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking by @ShitSecure .
Tweet card summary image
github.com
Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking - rtecCyberSec/SpeechRuntimeMove
0
38
0
@ShitSecure
S3cur3Th1sSh1t
8 days
RT @_JohnHammond: For the life of me I can never remember the registry tweaks to avoid TPM checks when installing Win11 in a VM. I finally….
0
249
0
@ShitSecure
S3cur3Th1sSh1t
8 days
RT @eversinc33: As a little follow up, I wrote a small blog post/tutorial on how to reverse engineer windows drivers with IDA - this is aim….
0
128
0
@ShitSecure
S3cur3Th1sSh1t
8 days
For anyone using BRC4. My colleage @dis0rder_0x00 ported several BOFs to COFF format and we made a pull request to the official repo: 🔥🔥. Including:. AAD PRT.Get Azure Token.Multi RDP.PetitPotam.Session Enum.SelfDelete.Cookie Monster.SSPI UAC Bypass
Tweet media one
2
38
145
@ShitSecure
S3cur3Th1sSh1t
15 days
RT @CICADA8Research: Hello, friends! We started writing a series of articles about Impacket. This will be useful if you have long wanted to….
Tweet card summary image
cicada-8.medium.com
Learn the basics of RPC, develop a client and server using C++
0
52
0
@ShitSecure
S3cur3Th1sSh1t
17 days
Don't have the time and knowledge myself but also don't want to fully ignore this.
1
0
17
@ShitSecure
S3cur3Th1sSh1t
17 days
I have absolutely no clue on how to exploit driver vulnerabilities but found two (by default shipped with every Windows) potential arbitrary read/write vulnerabilities via fuzzing today. I was told it might take days to weaponize this. Whoever is interested might DM me. 🧐
Tweet media one
Tweet media two
10
45
284
@ShitSecure
S3cur3Th1sSh1t
19 days
Nice one 🙃☝️.
@netbiosX
Panos Gkatziroulis 🦄
19 days
📢 Lateral Movement via BitLocker.📖 1x Playbook.🏹 4x Threat Hunting Queries.⚙️ 2x SIGMA Rules. #purpleteam #iPurpleTeam #sigma #detectionengineering #threathunting.
0
1
10
@ShitSecure
S3cur3Th1sSh1t
20 days
Because some C2’s are better for specific environments. e.g. sometimes .NET or NodeJS might be better. 🧐. Also you don’t want to get burned by core detections for some framework. If that happens in the middle of the project - you cannot do anything anymore. 👀.
0
0
14
@ShitSecure
S3cur3Th1sSh1t
20 days
People often ask which C2 to use nowadays. I would say the C2 doesn’t matter that much as long as you can adjust it to your needs. 🤔. But you should never stick to one horse alone. Make sure to have at least one or multiple alternatives. 💡
3
2
48
@ShitSecure
S3cur3Th1sSh1t
23 days
RT @incendiumrockz: I remember that I had to do some research online on how to make exploits for vulnerabilities over MS-RPC. With this b….
Tweet card summary image
incendium.rocks
Showcasing some different ways to craft exploits for vulnerabilities over MS-RPC
0
54
0
@ShitSecure
S3cur3Th1sSh1t
24 days
RT @_dirkjan: It's been almost a year since my last blog. So, here is a new one: Extending AD CS attack surface to the cloud with Intune….
dirkjanm.io
Active Directory Certificate Services (AD CS) attack surface is pretty well explored in Active Directory itself, with *checks notes* already 16 “ESC” attacks being publicly described. Hybrid certif...
0
195
0
@ShitSecure
S3cur3Th1sSh1t
25 days
RT @_Mayyhem: I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MS….
0
205
0
@ShitSecure
S3cur3Th1sSh1t
26 days
RT @hacker_ralf: AdaptixC2 v0.7 is out!. * AxScript scripting support.* Credential Manager added.* BOF support in….
0
117
0