
S3cur3Th1sSh1t
@ShitSecure
Followers
26K
Following
4K
Media
286
Statuses
3K
Pentesting, scripting, pwning!
127.0.0.1
Joined January 2019
This year it happened. What started as a spare time hobby and fun project became a commercial product for the Offensive Security community. I founded a company, @MSecOps . And this company will sell a Packer to Red Teams or Pentesters. (1/x) 🔥.
🔥 Introducing RustPack 🔥 . RustPack is an evasive Packer/Loader, that is capable of bypassing common AV/EDR vendors. It accepts user-provided known malicious input payloads, such as shellcode, C# assemblies or portable executables (PE). Those inputs are encrypted, and
137
116
294
RT @whokilleddb: Another hoontr find: tprtdll.dll (like so many others) exposes some Nt/Rtl/Zw functions. It doesn't redirect to ntdll, ins….
0
42
0
RT @_dirkjan: It seems there now is a BOF implementation of ADSyncDecrypt to dump Entra ID connect creds 👀.
github.com
The ADSyncDump BOF is a port of Dirkjan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencies. - Paradoxis/ADSyncDump-BOF
0
27
0
RT @TwoSevenOneT: Feeling too familiar with using Sysmon? You can use it for #redteam purposes by having it overwrite the #antimalware exec….
0
18
0
RT @TwoSevenOneT: Proactively creating processes with Protected Process Light (PPL) protection will give you more opportunities to abuse th….
zerosalarium.com
Abusing the Clipup.exe program by using the CreateProcessAsPPL.exe tool to destroy the executable file of the EDRs, Antivirus.
0
23
0
RT @Synacktiv: The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: Thi….
github.com
Group Policy Objects manipulation and exploitation framework - synacktiv/GroupPolicyBackdoor
0
98
0
RT @CICADA8Research: Hi Friends! We continue our series of articles about RPC and impacket. In the second part, we looked at tools that can….
cicada-8.medium.com
How to find a RPC server on the system and how to secure that : )
0
33
0
RT @RedTeamPT: @SpecterOps found out that the EFS service (PetitPotam) can simply be activated by asking the endpoint mapper. Great researc….
github.com
The efsr_spray module was used to activate the EFS pipes on Windows 11, as EFS was disabled by default. In SpecterOps blog on the WebClient service they discovered that the EFS service has a networ...
0
39
0
RT @_dirkjan: If you didn't find my Black Hat / Def Con slides yet, they are available on . Also includes the demo….
dirkjanm.io
0
68
0
RT @0xthirteen: I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it .
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
0
55
0
RT @netbiosX: Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking by @ShitSecure .
github.com
Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking - rtecCyberSec/SpeechRuntimeMove
0
38
0
RT @wil_fri3d: gpoParser, which I presented at #leHACK2025 and #DEFCON, is available here: It is a specialized util….
github.com
gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory environment. - synacktiv/gpoParser
0
169
0
RT @_JohnHammond: For the life of me I can never remember the registry tweaks to avoid TPM checks when installing Win11 in a VM. I finally….
0
249
0
RT @eversinc33: As a little follow up, I wrote a small blog post/tutorial on how to reverse engineer windows drivers with IDA - this is aim….
0
128
0
For anyone using BRC4. My colleage @dis0rder_0x00 ported several BOFs to COFF format and we made a pull request to the official repo: 🔥🔥. Including:. AAD PRT.Get Azure Token.Multi RDP.PetitPotam.Session Enum.SelfDelete.Cookie Monster.SSPI UAC Bypass
2
39
146
RT @CICADA8Research: Hello, friends! We started writing a series of articles about Impacket. This will be useful if you have long wanted to….
cicada-8.medium.com
Learn the basics of RPC, develop a client and server using C++
0
52
0
Nice one 🙃☝️.
📢 Lateral Movement via BitLocker.📖 1x Playbook.🏹 4x Threat Hunting Queries.⚙️ 2x SIGMA Rules. #purpleteam #iPurpleTeam #sigma #detectionengineering #threathunting.
0
1
10