S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile
S3cur3Th1sSh1t

@shitsecure

Pentesting, scripting, pwning!

ID: 1081124361619361792

calendar_today04-01-2019 09:45:08

2,2K Tweet

24,24K Takipçi

314 Takip Edilen

Jord (@0xlegacyy) 's Twitter Profile Photo

Yearly blog post just dropped: Control Flow Hijacking via Data Pointers 🐸 Showcasing how to find your own in Binary Ninja, how to weaponize and write a shellcode stub etc. Hopefully people find it useful :) legacyy.xyz/defenseevasion…

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

Yey, my talk "Revisiting Cross Session Activation attacks" was accepted for TROOPERS Conference 2025! 🥳 Looking forward to meet some of you there this year.

João Victor (@joaoviictorti) 's Twitter Profile Photo

Recently, I created a Rust library for call stack spoofing (uwd), you can check it out through the link Big thanks to klez and Kurosh Dabbagh for the help they gave me! github.com/joaoviictorti/…

Andrea Pierini (@decoder_it) 's Twitter Profile Photo

I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehensive starting point for anyone looking to learn more about this topic. ➡️decoder.cloud/2025/04/24/fro…

MSec Operations (@msecops) 's Twitter Profile Photo

#RustPack version 1.3.0 has been released today. This version includes (again) minor changes to the final payload metadata to remove various potential IoCs. 🔥🔥 For example, most packers use some kind of string based encoding to reduce entropy, such as the well-known UUID,

#RustPack version 1.3.0 has been released today. This version includes (again) minor changes to the final payload metadata to remove various potential IoCs. 🔥🔥 

For example, most packers use some kind of string based encoding to reduce entropy, such as the well-known UUID,
kmkz (@kmkz_security) 's Twitter Profile Photo

Goexec is a new take on some of the methods used to gain remote execution on Windows devices. Goexec implements a number of largely unrealized execution methods and provides significant OPSEC improvements overall falconops.com/blog/introduci… Github repo: github.com/FalconOpsLLC/g…

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

Blogpost from my colleague about what’s still possible with recently published COM/DCOM toolings, Cross Session Activation and Kerberos relaying 🔥 r-tec.net/r-tec-blog-win…

noodlearms (@infosecnoodle) 's Twitter Profile Photo

Short post on an alternative method for obtaining Microsoft Entra refresh tokens via Beacon. Proof of concept BOF is available on my GitHub 🙂 infosecnoodle.com/p/obtaining-mi…

MSec Operations (@msecops) 's Twitter Profile Photo

The Ruy-Lopez technique sometimes helps a lot with evasion. The technique was published and open sourced by our founder @Shitsecure two years ago. In #RustPack version 1.3.1 we added a custom, non-public version of this technique that is much more OPSec safe than the public

MSec Operations (@msecops) 's Twitter Profile Photo

And yes, out custom Ruy-Lopez technique even works perfectly fine for e.G. DLLs that are run via rundll32.exe. Same works for sideloading DLLs, and so on. 😎

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Yes, we're beating a dead horse. But that horse still runs in corporate networks - and quietly gives attackers the keys to the kingdom. We're publishing what’s long been exploitable. Time to talk about it. #DSM #Ivanti code-white.com/blog/ivanti-de…

chompie (@chompie1337) 's Twitter Profile Photo

Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/…

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Expression payloads meet mayhem in this week's Ivanti EPMM vulnerabilities — CVE-2025-4427 and CVE-2025-4428 — chained to achieve unauth RCE. Beware - this is currently being exploited ITW! Enjoy our analysis. labs.watchtowr.com/expression-pay…

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

Given the recent events with VMPSoft DMCA'ing educational YouTube videos demonstrating how to unpack malware protected with VMProtect, we have decided to release a free to use unpacker which works for all versions of VMP 3.x including the most recent version. Simply sign

Given the recent events with VMPSoft DMCA'ing educational YouTube videos demonstrating how to unpack malware protected with VMProtect, we have decided to release a free to use unpacker which works for all versions of VMP 3.x including the most recent version.

Simply sign
Yuval Gordon (@yug0rd) 's Twitter Profile Photo

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…
S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

The future of Pentesting with AI whereas every few checks cost 10$ with no limit or monthly budget options 👀 How to loose your money fast 😅 with burp AI !