
mert
@merterpreter
Followers
747
Following
994
Media
7
Statuses
55
from nothing to something to everything🗿
Joined November 2021
RT @fightdigitale: YENİ ŞAMPİYON KHAMZAT CHIMAEV! DDP'Yİ HAKEMLERİN ORTAK KARARIYLA MAĞLUP ETTİ!. #işbirliği @ssportplustr .
0
14
0
Capturing passwords from Password Managers via a BOF without using CTRL+C. Successfully tested on 1Password and KeePass.
3
75
475
RT @BushidoToken: Nothing too exciting by APT41 🇨🇳 here IMO, using Impacket, CobaltStrike, Mimikatz, Pillager, RawCopy, Neo-reGeorg. Using….
securelist.com
Kaspersky experts analyze an incident that saw APT41 launch a targeted attack on government IT services in Africa.
0
92
0
RT @_logangoins: I'm super happy to announce an operationally weaponized version of @YuG0rd's BadSuccessor in .NET format! With a minimum o….
github.com
SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai. - logangoins/SharpSuccessor
0
170
0
Did you know that if S1 is installed in your environment, you can gain SYSTEM privileges without running a getsystem command from your C2 by editing SentinelOne's Autorepair task? Needs localadmin priv
9
47
288
RT @vxunderground: "Our malware bypasses ALL EDRs! It is undetectable and silent". The undetectable and silent malware: .
0
70
0
Overall, I don't share anything here and I don't engage in arguments. But how can something be considered a 0day when it's a method that many people, including myself, have been using for over 4 years, especially if an article about it was written a long time ago?.
We have uncovered a Windows .lnk shortcut bug (#ZDI-CAN-25373) being exploited by #APT groups and cybercriminals worldwide. This bug in Windows .lnk files allows attackers to execute hidden malicious commands that aren't visible when viewing shortcut properties. More details 🧵
0
0
9
RT @CyberWarship: ''GitHub - mertdas/SharpIncrease: A Tool that aims to evade av with binary padding''. #infosec #pentest #redteam #bluetea….
github.com
A Tool that aims to evade av with binary padding. Contribute to mertdas/SharpIncrease development by creating an account on GitHub.
0
27
0
RT @netbiosX: SharpIncrease: A Tool that aims to evade AV with binary padding
github.com
A Tool that aims to evade av with binary padding. Contribute to mertdas/SharpIncrease development by creating an account on GitHub.
0
32
0
SharpIncrease is A Tool that aims to evade av with binary padding. I used this tool for years in my Red Team operations. SharpIncrease can be used as a standalone executable or with execute-assembly, inline-executeassembly.
github.com
A Tool that aims to evade av with binary padding. Contribute to mertdas/SharpIncrease development by creating an account on GitHub.
0
30
93
RT @nickvourd: Thanks @VeryDampTowel for contributions! Supernova 2.1 is out now!. - Added VBA template.
github.com
Real fucking shellcode encryptor & obfuscator tool - nickvourd/Supernova
0
8
0