S3cur3Th1sSh1t

2.9K posts

S3cur3Th1sSh1t

S3cur3Th1sSh1t

@ShitSecure

Pentesting, scripting, pwning!

127.0.0.1 가입일 Ocak 2019
335 팔로잉27.9K 팔로워
고정된 트윗
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
This year it happened. What started as a spare time hobby and fun project became a commercial product for the Offensive Security community. I founded a company, @MSecOps . And this company will sell a Packer to Red Teams or Pentesters. (1/x) 🔥
MSec Operations@MSecOps

🔥 Introducing RustPack 🔥 . RustPack is an evasive Packer/Loader, that is capable of bypassing common AV/EDR vendors. It accepts user-provided known malicious input payloads, such as shellcode, C# assemblies or portable executables (PE). Those inputs are encrypted, and decrypted on runtime by a newly generated non non-malicious payload. This process is known to be called packing or crypting. Some Features: - Each payload looks different, making signature creation more difficult. - Userland hooks are bypassed by default for each generated payload. - The encryption key is never fully embedded in the final payload but always retrieved on runtime. This is good for bypassing emulators or automatic unpacking engines. - Encrypted payloads can also be decoupled from the new binary to load them from a remote location on runtime - Multiple Anti-Debug techniques are applied to each payload by default. - Environmental Keying and Anti-Sandbox options included. - No cloud service. The software is delivered to the customer as a closed source solution Evasion options: - Several AMSI bypass techniques ranging from Patching to using Hardware Breakpoints - Multiple optional ETW bypasses - Support for Module stomping - OPSec safe remote injection techniques such as ThreadlessInject or a customised Caro-Kann technique The tool is still under active development and lot's of features/demos/etc. will follow. Some more information can be found here: msecops.de/products #redteam #pentesting #pentest #OST

English
137
115
301
53.7K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
WSUS fake updates for LPE or RCE when HTTP is being used? This one took many days and troubleshooting with claude but now we have a C2-Capable tool for the full stack including poisoning plus fake update delivery - the only thing we need is a low privileged C2 session! 🔥
S3cur3Th1sSh1t tweet media
English
4
38
200
11.7K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
I had this idea ~1.5-2 years already but never had the time to implement this on my own manually. I have dozens of such ideas. Now with coding agents we can level up the game super fast in terms of internal tooling. 🤠
English
1
0
16
1.6K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
@dcl0ver Well for RBCD I manually coerce machine account authentication so that always has permissions. For SMB any incoming auth will be “tried” I may later integrate alternatives to code execution for SMB
English
0
0
1
22
dcL0ver
dcL0ver@dcl0ver·
@ShitSecure How do you verify that your account has sufficient privileges to configure RBCD or execute commands via SMB?
English
1
0
0
23
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Thanks claude, always wanted to do this myself it was 20 minutes effort and one prompt. 😎
S3cur3Th1sSh1t tweet media
English
3
3
77
7.1K
S3cur3Th1sSh1t 리트윗함
Truffle Security
Truffle Security@trufflesec·
Claude (and other models) are hacking systems WITHOUT YOU ASKING. That’s what we found across dozens of experiments. When faced with innocent tasks that can only be accomplished via hacking, they often choose to hack. We found this alarming. What does this mean for the future of AI safety? 🚨🚨🚨 🔗trufflesecurity.com/blog/claude-tr…
Truffle Security tweet media
English
8
40
200
81.3K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
@Defte_ It’s often administrator on many clients so that’s one client pwn -> all clients pwned
English
1
0
4
1.5K
Aurélien Chalot
Aurélien Chalot@Defte_·
Dumb question. I'm fine-tuning my AD recommendation and work on the NAA SCCM. There's one thing I don't get. Since we need the domain computer password to retrieve the NAA password from the HTTP endpoint, why do we need the NAA account if we already have a computer account ?
English
4
0
21
4.8K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
@sprocket_ed Exactly. I can do all those things I wanted to for a long time now quite fast. :-)
English
0
0
2
578
ed
ed@sprocket_ed·
@ShitSecure My favorite part of all this - being able to do the things I didn’t have time for or wasn’t quite smart/focused enough to do.
English
1
0
2
637
S3cur3Th1sSh1t 리트윗함
Andrea P
Andrea P@decoder_it·
Just dropped a short post on why some classic NTLM relay tricks seems to be dead on Server 2025. decoder.cloud/2026/02/25/wha…
English
2
65
201
13.4K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
@openclaw_ex Rate limiting in place plus no bill for traffic there at all ☝️😜
English
0
0
0
75
Daniel Kade
Daniel Kade@openclaw_ex·
@ShitSecure tried this with a chess game last month - forgot to add rate limiting in the prompts, got my aws bill to $340 in 2 days from someone botting the multiplayer endpoint
English
2
0
0
89
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
#Offtopic Claude code is not just cool for offensive security coding! I always wanted to write games but never had time to actually really dig into it. 🤠 Well now with a few prompts I can proudly present Multiplayer Snake as browser game! multiplayer-snake.com 🔥🔥🔥
GIF
English
5
3
27
3K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
The code can be found here for those interested: github.com/S3cur3Th1sSh1t… Can also get played on the linux system console with multiple players and get hosted locally anywhere :-)
English
0
0
3
1.1K
S3cur3Th1sSh1t 리트윗함
5pider
5pider@C5pider·
Havoc Professional Finally Released! 🕸️🕷️ Since our last blog post introducing the Havoc Professional framework and the Kaine-Kit, we've been refining the framework behind the scenes while also welcoming @avx128 as a new member of our team. This blog post covers the numerous features included in the initial release of Havoc Professional. I'm excited to finally share the work my team and I have put in over the past year. This is just the beginning of what we have planned. infinitycurve.org/blog/release
English
29
68
306
33.1K
eversinc33 🤍🔪⋆。˚ ⋆
So with everyone spending all their money on claude tokens, why does nobody release a cool project? 😔
English
9
0
25
3.9K
S3cur3Th1sSh1t 리트윗함
Grzegorz Tworek
Grzegorz Tworek@0gtweet·
What do the ❌ Application Event Log, ❌ System Event Log, ❌ Sysmon Event Log, ❌ monitoring tools, ❌ and some EDRs have in common? They all rely on ETW listeners! Close their listeners with ControlTrace() and they will stop reporting. Or just close all listeners in your system with a shiny new toy: github.com/gtworek/PSBits…
Grzegorz Tworek tweet media
English
8
78
365
36.5K
Melvin langvik
Melvin langvik@Flangvik·
Pushed a major redesign and improvement of amsi.fail for the old-school PowerShell warriors out there. Includes five more recent patch methods and tons of fixes, thanks to my best friend Claude 🤠
English
2
21
99
5.9K