mert Profile
mert

@merterpreter

Followers
747
Following
994
Media
7
Statuses
55

from nothing to something to everything🗿

Joined November 2021
Don't wanna be here? Send us removal request.
@merterpreter
mert
4 months
0
0
3
@merterpreter
mert
20 days
RT @fightdigitale: YENİ ŞAMPİYON KHAMZAT CHIMAEV! DDP'Yİ HAKEMLERİN ORTAK KARARIYLA MAĞLUP ETTİ!. #işbirliği @ssportplustr .
0
14
0
@merterpreter
mert
20 days
Its happening🥇.
0
0
0
@merterpreter
mert
20 days
Khamzat😦.
0
0
0
@merterpreter
mert
20 days
🥇.
@AOUREDOO
AWURED0
20 days
Khamzat Chimaev has to finally use this as his walkout song for his Title fight
0
0
0
@merterpreter
mert
2 months
Capturing passwords from Password Managers via a BOF without using CTRL+C. Successfully tested on 1Password and KeePass.
Tweet media one
Tweet media two
3
75
475
@merterpreter
mert
2 months
RT @BushidoToken: Nothing too exciting by APT41 🇨🇳 here IMO, using Impacket, CobaltStrike, Mimikatz, Pillager, RawCopy, Neo-reGeorg. Using….
Tweet card summary image
securelist.com
Kaspersky experts analyze an incident that saw APT41 launch a targeted attack on government IT services in Africa.
0
92
0
@merterpreter
mert
2 months
. .
@UFCRosterWatch
UFC Roster Watch
2 months
❌ Fighter removed: Jon Jones.
0
0
2
@merterpreter
mert
4 months
RT @_logangoins: I'm super happy to announce an operationally weaponized version of @YuG0rd's BadSuccessor in .NET format! With a minimum o….
Tweet card summary image
github.com
SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai. - logangoins/SharpSuccessor
0
170
0
@merterpreter
mert
4 months
Did you know that if S1 is installed in your environment, you can gain SYSTEM privileges without running a getsystem command from your C2 by editing SentinelOne's Autorepair task? Needs localadmin priv
Tweet media one
Tweet media two
9
47
288
@merterpreter
mert
5 months
RT @vxunderground: "Our malware bypasses ALL EDRs! It is undetectable and silent". The undetectable and silent malware: .
0
70
0
@merterpreter
mert
6 months
Overall, I don't share anything here and I don't engage in arguments. But how can something be considered a 0day when it's a method that many people, including myself, have been using for over 4 years, especially if an article about it was written a long time ago?.
@AliakbarZahravi
Aliakbar Zahravi
6 months
We have uncovered a Windows .lnk shortcut bug (#ZDI-CAN-25373) being exploited by #APT groups and cybercriminals worldwide. This bug in Windows  .lnk files allows attackers to execute hidden malicious commands that aren't visible when viewing shortcut properties. More details 🧵
Tweet media one
0
0
9
@merterpreter
mert
9 months
RT @HaberKupur: “Ölmek bile dert”. Mezarcı ile bir adamın diyaloğu
0
2K
0
@merterpreter
mert
11 months
RT @emrpuzo: Hayat böyle.
0
752
0
@merterpreter
mert
1 year
SharpIncrease is A Tool that aims to evade av with binary padding. I used this tool for years in my Red Team operations. SharpIncrease can be used as a standalone executable or with execute-assembly, inline-executeassembly.
Tweet card summary image
github.com
A Tool that aims to evade av with binary padding. Contribute to mertdas/SharpIncrease development by creating an account on GitHub.
0
30
93
@merterpreter
mert
1 year
RT @nickvourd: Thanks @VeryDampTowel for contributions! Supernova 2.1 is out now!. - Added VBA template.
Tweet card summary image
github.com
Real fucking shellcode encryptor & obfuscator tool - nickvourd/Supernova
0
8
0
@merterpreter
mert
1 year
RT @7etsuo: George Hotz says that everyone should learn C and Assembly.
0
781
0
@merterpreter
mert
2 years
Tweet media one
4
25
239