S3cur3Th1sSh1t

3K posts

S3cur3Th1sSh1t

S3cur3Th1sSh1t

@ShitSecure

Pentesting, scripting, pwning!

127.0.0.1 Katılım Ocak 2019
335 Takip Edilen28.2K Takipçiler
Sabitlenmiş Tweet
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
This year it happened. What started as a spare time hobby and fun project became a commercial product for the Offensive Security community. I founded a company, @MSecOps . And this company will sell a Packer to Red Teams or Pentesters. (1/x) 🔥
MSec Operations@MSecOps

🔥 Introducing RustPack 🔥 . RustPack is an evasive Packer/Loader, that is capable of bypassing common AV/EDR vendors. It accepts user-provided known malicious input payloads, such as shellcode, C# assemblies or portable executables (PE). Those inputs are encrypted, and decrypted on runtime by a newly generated non non-malicious payload. This process is known to be called packing or crypting. Some Features: - Each payload looks different, making signature creation more difficult. - Userland hooks are bypassed by default for each generated payload. - The encryption key is never fully embedded in the final payload but always retrieved on runtime. This is good for bypassing emulators or automatic unpacking engines. - Encrypted payloads can also be decoupled from the new binary to load them from a remote location on runtime - Multiple Anti-Debug techniques are applied to each payload by default. - Environmental Keying and Anti-Sandbox options included. - No cloud service. The software is delivered to the customer as a closed source solution Evasion options: - Several AMSI bypass techniques ranging from Patching to using Hardware Breakpoints - Multiple optional ETW bypasses - Support for Module stomping - OPSec safe remote injection techniques such as ThreadlessInject or a customised Caro-Kann technique The tool is still under active development and lot's of features/demos/etc. will follow. Some more information can be found here: msecops.de/products #redteam #pentesting #pentest #OST

English
138
114
302
55.1K
S3cur3Th1sSh1t retweetledi
MSec Operations
MSec Operations@MSecOps·
Backdooring existing executables or DLLs for stealthy payload execution? With version 1.7.0 of RustPack, this can be easily done in a few seconds. We live-debug/trace the execution flow in the target executable to find a suitable backdoor position at runtime, instead of patching the entry point. 🤠 Even Frontier LLM models analysing the output executable with reversing tools at hand and one task - determining whether the target is benign or malicious - will tell you this is benign. 🔥 We work hard, you get the best possible evasion! #redteam #ost #pentest #maldev
English
1
9
57
4.2K
S3cur3Th1sSh1t retweetledi
Nick VanGilder
Nick VanGilder@nickvangilder·
I've been pushing out some new features and functionality over at redteam.community and one cool thing that you might appreciate is: past conference talks. I don't know about you, but I've always thought it was such a pain in the ass to track them all down. Obviously, you could search online, or check out YT (if you could remember the con handle), etc. Nothing was ever consolidated in one central place. So, I'm trying to fix that. I don't have _every_ video, but I do have a lot... currently over 8000 indexed. I've wired it up so that the master list of conference pulls from cons on the Industry Conferences page (industry_conferences.json). In the schema, every con has a URL field and Past Conference Talks leverages that. Every day a cron harvests more and more videos from the con pages. And what I really like is that you can watch all of the past talks in-line without leaving the site or the page. Additionally, and maybe my 2nd favorite feature, is how speakers are extracted from the videos and/or matched against the con's official website to create "social chips". These pink chip exist all throughout the site and map back to a social directory on the site that regularly syncs with all the major social sites where infosec folks hangout (x, mastodon, Linkedin, bluesky, twitch, etc (with follower counts(APIs anyone?!)). The linkages are actually pretty cool because you can effectively click on a speaker/instructor/trainer from anywhere on the site where you see a pink chip and be able to see another con they have spoken at, a course they might teach, or content they create on their YouTube channel. It's not all completely and fully wired up yet, but much of what I've described works today. As time allows, I'm going to continue to extend and expand the "social" feature of the site and continue to add more sections. As always, if you have any ideas, bug reports, or feedback, just lmk. Happy to chat!
Nick VanGilder tweet media
English
3
30
120
7.6K
S3cur3Th1sSh1t retweetledi
Fabian Bader
Fabian Bader@fabian_bader·
In my latest blog "Now You See Me: AADGraphActivityLogs" I explore the newly released Azure AD Graph logs and demonstrate how you can detect tools like ROADtools and AADinternals that rely on this API and have been under the radar for defender so far. cloudbrothers.info/en/aadgraphact…
English
3
68
244
17.1K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Where did all my Github Copilot tokens go the last ~2-3 months? They all went here: multiplayer-snake.com Grab your team mates and pause a bit for fun! 🫡
S3cur3Th1sSh1t tweet media
English
0
3
17
1.8K
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Can we please use vibe coding for what it was probably meant for? Non-serious coding work Small visualizations, weird integrations, gamified tools. Like IDA Pro, but I can walk through the function graph in Roblox, Doom or Age of Empires That’s where vibe coding makes sense to me. Build something funny, break it, throw it away, no one has to maintain the codebase for 7 years. More of that, please
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
English
22
16
265
21K
S3cur3Th1sSh1t retweetledi
V4bel
V4bel@v4bel·
💥 Introducing "Dirty Frag" A universal Linux LPE chaining two vulns in xfrm-ESP and RxRPC. A successor class to Dirty Pipe & Copy Fail. No race, no panic on failure, fully deterministic. ~9 years latent. Ubuntu / RHEL / Fedora / openSUSE / CentOS / AlmaLinux, and more. Even if you've applied the "Copy Fail" mitigation, your Linux is still vulnerable to "Dirty Frag". Apply the Dirty Frag mitigation. Details: dirtyfrag.io
GIF
English
41
704
2.1K
518.7K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
@domchell @checkymander @HackingLZ Update on that. It will only work on systems with .NET Core 8.0 installed unless the whole dependencies are shipped. So yeah I need some more research here :-)
English
0
0
2
135
S3cur3Th1sSh1t retweetledi
Tom Jøran Sønstebyseter Rønning
Tom Jøran Sønstebyseter Rønning@L1v1ng0ffTh3L4N·
Microsoft Edge loads all your saved passwords into memory in cleartext — even when you’re not using them.
English
250
1.4K
8.9K
1.5M
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Making progress with an autonomous local Pentest LLM pipeline - using Qwen3 27b it's finding and verifying real vulnerabilities and creating a full report including Management-Summary already for us. 🧐 Better than many web vulnerability scanners as it even found e.G. IDOR.
S3cur3Th1sSh1t tweet mediaS3cur3Th1sSh1t tweet media
English
16
24
205
18.6K
sehno
sehno@_sehno_·
@ShitSecure Have you tested Opencode or Hermes-agent with this model?
English
1
0
0
273
Janberk Besgul
Janberk Besgul@Janberk_Besgul·
@ShitSecure So LLM reads the requests and responses from burp with custom extension and find vulnerabilities from there Did I understand right?
English
1
0
0
121
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
@107cwk I dont think its a replacement to humans at all. Its running in parallel as helper. Imagine it as a "classic" scanner on steroids.
English
1
0
0
692
nemo
nemo@107cwk·
@ShitSecure Economics question - how much does a price of an LLM need go to up (either for token, or GPU rental/purchase) for this to be no longer viable compared to paying a human your normal rate?
English
1
0
1
794
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
@TurvSec Lots of context injection with guidance, compression in between and logging to make sure nothing is missed and all checks are done properly around the LLM as backend.
English
0
0
1
258
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
@TurvSec Im fiddling around with different models that match the hardware we currently have for testing autonomous LLM Pentest proof of concepts and this was just released and looked promising. 🙂 The model is unmodified the frontend is custom with different MCP Servers.
English
1
0
1
1K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
@Janberk_Besgul Multiple MCP servers for different tasks in this case. And a custom burp extension to connect it with the ongoing pentest and the findings there.
English
1
0
1
679
Janberk Besgul
Janberk Besgul@Janberk_Besgul·
@ShitSecure Is it verifying or finding with using a docker pentest image or mcp for using pentest tools? Or using playwright to find it manually?
English
1
0
2
952
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
@R4ven4rc This is fully custom nothing public full stack self developed. In this case a local LLM but choosing different backends such as cloud providers would in theory also be possible.
English
1
0
1
491
R4ven4rc
R4ven4rc@R4ven4rc·
@ShitSecure Are you using a custom stack, Claude or Hermes?
English
1
0
0
533
S3cur3Th1sSh1t retweetledi
vx-underground
vx-underground@vxunderground·
CVE-2026-31431 a/k/a CopyFail > Linux LPE > Description sounds like AI slop > Exploit is legit > Impacts every Linux kernel from 2017 - Now > Proof-of-concept released > It's Wednesday? copy.fail
English
102
542
3.7K
258.5K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Anyone interested in what you need for proper loader development in 2026? My talk for @x33fcon was accepted, so I'll take about Malware again. 🔥 It's a unique talk and will only be held there this year! Hope to see some of you in Poland. 😎
S3cur3Th1sSh1t tweet media
English
8
12
118
6K