S3cur3Th1sSh1t Profile
S3cur3Th1sSh1t

@ShitSecure

Followers
26K
Following
4K
Media
286
Statuses
3K

Pentesting, scripting, pwning!

127.0.0.1
Joined January 2019
Don't wanna be here? Send us removal request.
@ShitSecure
S3cur3Th1sSh1t
1 year
This year it happened. What started as a spare time hobby and fun project became a commercial product for the Offensive Security community. I founded a company, @MSecOps . And this company will sell a Packer to Red Teams or Pentesters. (1/x) 🔥.
@MSecOps
MSec Operations
1 year
🔥 Introducing RustPack 🔥 . RustPack is an evasive Packer/Loader, that is capable of bypassing common AV/EDR vendors. It accepts user-provided known malicious input payloads, such as shellcode, C# assemblies or portable executables (PE). Those inputs are encrypted, and
Tweet media one
137
116
294
@ShitSecure
S3cur3Th1sSh1t
2 hours
RT @whokilleddb: Another hoontr find: tprtdll.dll (like so many others) exposes some Nt/Rtl/Zw functions. It doesn't redirect to ntdll, ins….
0
42
0
@grok
Grok
7 days
What do you want to know?.
587
378
2K
@ShitSecure
S3cur3Th1sSh1t
5 hours
RT @TwoSevenOneT: Feeling too familiar with using Sysmon? You can use it for #redteam purposes by having it overwrite the #antimalware exec….
0
18
0
@ShitSecure
S3cur3Th1sSh1t
2 days
RT @DirectoryRanger: DLL ForwardSideloading.
0
35
0
@ShitSecure
S3cur3Th1sSh1t
3 days
RT @TwoSevenOneT: Proactively creating processes with Protected Process Light (PPL) protection will give you more opportunities to abuse th….
Tweet card summary image
zerosalarium.com
Abusing the Clipup.exe program by using the CreateProcessAsPPL.exe tool to destroy the executable file of the EDRs, Antivirus.
0
23
0
@ShitSecure
S3cur3Th1sSh1t
4 days
RT @Synacktiv: The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: Thi….
Tweet card summary image
github.com
Group Policy Objects manipulation and exploitation framework - synacktiv/GroupPolicyBackdoor
0
98
0
@ShitSecure
S3cur3Th1sSh1t
4 days
RT @CICADA8Research: Hi Friends! We continue our series of articles about RPC and impacket. In the second part, we looked at tools that can….
Tweet card summary image
cicada-8.medium.com
How to find a RPC server on the system and how to secure that : )
0
33
0
@ShitSecure
S3cur3Th1sSh1t
6 days
RT @_dirkjan: If you didn't find my Black Hat / Def Con slides yet, they are available on . Also includes the demo….
dirkjanm.io
0
68
0
@ShitSecure
S3cur3Th1sSh1t
7 days
RT @0xthirteen: I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it .
Tweet card summary image
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
0
55
0
@ShitSecure
S3cur3Th1sSh1t
7 days
RT @netbiosX: Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking by @ShitSecure .
Tweet card summary image
github.com
Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking - rtecCyberSec/SpeechRuntimeMove
0
38
0
@ShitSecure
S3cur3Th1sSh1t
11 days
RT @_JohnHammond: For the life of me I can never remember the registry tweaks to avoid TPM checks when installing Win11 in a VM. I finally….
0
249
0
@ShitSecure
S3cur3Th1sSh1t
11 days
RT @eversinc33: As a little follow up, I wrote a small blog post/tutorial on how to reverse engineer windows drivers with IDA - this is aim….
0
128
0
@ShitSecure
S3cur3Th1sSh1t
11 days
For anyone using BRC4. My colleage @dis0rder_0x00 ported several BOFs to COFF format and we made a pull request to the official repo: 🔥🔥. Including:. AAD PRT.Get Azure Token.Multi RDP.PetitPotam.Session Enum.SelfDelete.Cookie Monster.SSPI UAC Bypass
Tweet media one
2
39
146
@ShitSecure
S3cur3Th1sSh1t
18 days
RT @CICADA8Research: Hello, friends! We started writing a series of articles about Impacket. This will be useful if you have long wanted to….
Tweet card summary image
cicada-8.medium.com
Learn the basics of RPC, develop a client and server using C++
0
52
0
@ShitSecure
S3cur3Th1sSh1t
20 days
Don't have the time and knowledge myself but also don't want to fully ignore this.
1
0
17
@ShitSecure
S3cur3Th1sSh1t
20 days
I have absolutely no clue on how to exploit driver vulnerabilities but found two (by default shipped with every Windows) potential arbitrary read/write vulnerabilities via fuzzing today. I was told it might take days to weaponize this. Whoever is interested might DM me. 🧐
Tweet media one
Tweet media two
10
45
284
@ShitSecure
S3cur3Th1sSh1t
22 days
Nice one 🙃☝️.
@netbiosX
Panos Gkatziroulis 🦄
22 days
📢 Lateral Movement via BitLocker.📖 1x Playbook.🏹 4x Threat Hunting Queries.⚙️ 2x SIGMA Rules. #purpleteam #iPurpleTeam #sigma #detectionengineering #threathunting.
0
1
10
@ShitSecure
S3cur3Th1sSh1t
23 days
Because some C2’s are better for specific environments. e.g. sometimes .NET or NodeJS might be better. 🧐. Also you don’t want to get burned by core detections for some framework. If that happens in the middle of the project - you cannot do anything anymore. 👀.
0
0
14