khr0x40sh Profile Banner
khr@sh Profile
khr@sh

@khr0x40sh

Followers
280
Following
2K
Media
66
Statuses
2K

Aspiring, self-taught developer (C, C++, C#, VB.Net, Perl, Python, Java) with interests in Information Security, humor, and well when appropriate, both.

USA
Joined November 2010
Don't wanna be here? Send us removal request.
@khr0x40sh
khr@sh
1 month
RT @DirectoryRanger: One Tool To Rule Them All. AMSI, CLM and ETW – defeated* with one Microsoft signed tool.
0
40
0
@khr0x40sh
khr@sh
2 months
RT @Dinosn: Windows remote execution multitool.
0
29
0
@khr0x40sh
khr@sh
2 months
RT @0x534c: 🚨 New Malware Alert 🚨. 🐔 Golden Chickens (aka Venom Spider🕷️) has unleashed TerraStealerV2 & TerraLogger, targeting credentials….
0
23
0
@khr0x40sh
khr@sh
2 months
RT @DarkWebInformer: 🚨CVE-2025-3776: Full WordPress Takeover Without Login (Critical RCE Exploit). Credit: https://….
0
258
0
@khr0x40sh
khr@sh
2 months
RT @cryptonator1337: 'Protonmail behaves like a CIA/NSA honeypot'
Tweet media one
0
432
0
@khr0x40sh
khr@sh
2 months
RT @hackerschoice: 1-line "Living Off The Land" persistent DNS-reverse backdoor. (now added to . .
0
67
0
@khr0x40sh
khr@sh
2 months
RT @hackerfantastic: Example of 1-click Telnet client exploit, MS-TNAP will automatically send credentials to hosts in Intranet or Trusted….
0
96
0
@khr0x40sh
khr@sh
3 months
RT @binitamshah: Ghosting-AMSI : AMSI Bypass via RPC Hijack (NdrClientCall3) :
0
66
0
@khr0x40sh
khr@sh
3 months
RT @Dinosn: Wshlient - A Simple Tool To Interact With Web Shells And Command Injection Vulnerabilities
0
34
0
@khr0x40sh
khr@sh
3 months
RT @zeifan: A quick writeup on potential security issue of Windows LNK that I reported to MSRC last month. They decided to not fix due to r….
0
112
0
@khr0x40sh
khr@sh
3 months
RT @Dinosn: CVE-2025-21756: How a Tiny Linux Kernel Bug Led to a Full Root Exploit, PoC Releases
0
74
0
@khr0x40sh
khr@sh
3 months
RT @Wietze: 🚀 Today I'm launching ArgFuscator: an open-source platform documenting command-line obfuscation tricks AND letting you generate….
0
185
0
@khr0x40sh
khr@sh
3 months
RT @binitamshah: Bypassing Windows Defender antivirus in 2025 : Evasion Techniques Using Direct Syscalls and XOR Encryption – Part 1 : http….
0
191
0
@khr0x40sh
khr@sh
3 months
RT @0x64616e: NTLM Relaying with DCOM cross-session activation over an external OXID resolver. This variant has the advantage over regular….
0
77
0
@khr0x40sh
khr@sh
3 months
RT @cyb3rops: In the past, you had to:.phish a user, drop malware, escalate privileges, pivot to servers, evade EDR, dump creds, move later….
0
178
0
@khr0x40sh
khr@sh
3 months
RT @arekfurt: Oh come the f***🤬 on. You gotta be kidding. If an attacker can get a user to click a bloody WebEx meeting invite link they c….
0
84
0
@khr0x40sh
khr@sh
3 months
RT @akaclandestine: GitHub - iss4cf0ng/DuplexSpyCS: Remote Access Tool written in C#
0
22
0
@khr0x40sh
khr@sh
3 months
RT @jamieantisocial: this continues to be the most simple yet diabolical defense evasion.
Tweet media one
0
82
0
@khr0x40sh
khr@sh
3 months
RT @Dinosn: CVE-2025-21299: Unguarding Microsoft Credential Guard
0
14
0
@khr0x40sh
khr@sh
3 months
RT @sensepost: The S is for Security. How to use WinRMS as a solid NTLM relay target, and why it’s less secure than WinRM over HTTP. By @De….
0
45
0