
S3cur3Th1sSh1t
@ShitSecure
Followers
26K
Following
4K
Media
286
Statuses
3K
Pentesting, scripting, pwning!
127.0.0.1
Joined January 2019
This year it happened. What started as a spare time hobby and fun project became a commercial product for the Offensive Security community. I founded a company, @MSecOps . And this company will sell a Packer to Red Teams or Pentesters. (1/x) 🔥.
🔥 Introducing RustPack 🔥 . RustPack is an evasive Packer/Loader, that is capable of bypassing common AV/EDR vendors. It accepts user-provided known malicious input payloads, such as shellcode, C# assemblies or portable executables (PE). Those inputs are encrypted, and
137
116
294
RT @Synacktiv: The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: Thi….
github.com
Group Policy Objects manipulation and exploitation framework - synacktiv/GroupPolicyBackdoor
0
86
0
RT @CICADA8Research: Hi Friends! We continue our series of articles about RPC and impacket. In the second part, we looked at tools that can….
cicada-8.medium.com
How to find a RPC server on the system and how to secure that : )
0
25
0
RT @RedTeamPT: @SpecterOps found out that the EFS service (PetitPotam) can simply be activated by asking the endpoint mapper. Great researc….
github.com
The efsr_spray module was used to activate the EFS pipes on Windows 11, as EFS was disabled by default. In SpecterOps blog on the WebClient service they discovered that the EFS service has a networ...
0
39
0
RT @_dirkjan: If you didn't find my Black Hat / Def Con slides yet, they are available on . Also includes the demo….
dirkjanm.io
0
68
0
RT @0xthirteen: I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it .
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
0
55
0
RT @netbiosX: Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking by @ShitSecure .
github.com
Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking - rtecCyberSec/SpeechRuntimeMove
0
38
0
RT @wil_fri3d: gpoParser, which I presented at #leHACK2025 and #DEFCON, is available here: It is a specialized util….
github.com
gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory environment. - synacktiv/gpoParser
0
170
0
RT @_JohnHammond: For the life of me I can never remember the registry tweaks to avoid TPM checks when installing Win11 in a VM. I finally….
0
249
0
RT @eversinc33: As a little follow up, I wrote a small blog post/tutorial on how to reverse engineer windows drivers with IDA - this is aim….
0
128
0
For anyone using BRC4. My colleage @dis0rder_0x00 ported several BOFs to COFF format and we made a pull request to the official repo: 🔥🔥. Including:. AAD PRT.Get Azure Token.Multi RDP.PetitPotam.Session Enum.SelfDelete.Cookie Monster.SSPI UAC Bypass
2
38
145
RT @CICADA8Research: Hello, friends! We started writing a series of articles about Impacket. This will be useful if you have long wanted to….
cicada-8.medium.com
Learn the basics of RPC, develop a client and server using C++
0
52
0
Nice one 🙃☝️.
📢 Lateral Movement via BitLocker.📖 1x Playbook.🏹 4x Threat Hunting Queries.⚙️ 2x SIGMA Rules. #purpleteam #iPurpleTeam #sigma #detectionengineering #threathunting.
0
1
10
RT @incendiumrockz: I remember that I had to do some research online on how to make exploits for vulnerabilities over MS-RPC. With this b….
incendium.rocks
Showcasing some different ways to craft exploits for vulnerabilities over MS-RPC
0
54
0
RT @_dirkjan: It's been almost a year since my last blog. So, here is a new one: Extending AD CS attack surface to the cloud with Intune….
dirkjanm.io
Active Directory Certificate Services (AD CS) attack surface is pretty well explored in Active Directory itself, with *checks notes* already 16 “ESC” attacks being publicly described. Hybrid certif...
0
195
0
RT @_Mayyhem: I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MS….
0
205
0
RT @hacker_ralf: AdaptixC2 v0.7 is out!. * AxScript scripting support.* Credential Manager added.* BOF support in….
0
117
0