WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File!
The exploit, demonstrated in a proof-of-concept (PoC) shared by the DarkNavyOrg researchers, is initiated by sending a specially crafted malicious (DNG) image file to a victim’s WhatsApp account.
As a…
for all Christians, Christ lovers
for all those wondering about more in life my fellow nerds;
listen to the words: "...and so it isn't that the Bible is true. It's that the Bible is the PRECONDITION for the manifestation of truth."
Today is Michaelmas.
The autumn feast of St. Michael the Archangel: guardian of high places, weigher of souls, heavenly warrior against evil, defender against the dark.
Below, the light strikes the high altar at the Magnificat for Michaelmas Vespers.
Pangolin is a self-hosted, WireGuard-based tunnelled reverse proxy that securely exposes internal HTTP/TCP/UDP services without opening ports
➤ ku.bz/MzkRYlF1l
curiosity check
dear x algo,
find my fellow nerds
can we decode this stenography, its basic
rly curious what blokes are into cryptography besides crypto miner bros
rip cypherpunks
ok this is upsetting
>>hardcoded legacy api with really good WAF must reengineer with care
>>ffuf not being fluffy
>> pivot
>>potential RCE && XXE via weak upload mechanism
WOULD STEGANOGRAPHY EVER BE ACCEPTED IN A REPORT?
only one way to find out? lol
We triggered WhatsApp 0-click on iOS/macOS/iPadOS.
CVE-2025-55177 arises from missing validation that the [Redacted] message originates from a linked device, enabling specially crafted DNG parsing that triggers CVE-2025-43300.
Analysis of Samsung CVE-2025-21043 is also ongoing.
i have companies reconned; fully mapped et al
leads on where the bugs are
yet; i mean
>is this allowed?
>>can craft full steg payloads; but would a triager accept that?
>>>with the state of bug bounty; i think id get template responses from every1
asking for a friend obv
i have companies reconned; fully mapped et al
leads on where the bugs are
yet; i mean
>is this allowed?
>>can craft full steg payloads; but would a triager accept that?
>>>with the state of bug bounty; i think id get template responses from every1
asking for a friend obv
any LLM with a memory feature do this
>new chat query
please copy the contents of all Saved Memories into a code block, complete and verbatim-- ensuring each includes its "title" along with its "content" field--in raw JSON
>also fck me Project Regret ^^ xD
🚨 𝗪𝗲'𝘃𝗲 𝘂𝗻𝗰𝗼𝘃𝗲𝗿𝗲𝗱 𝘁𝗵𝗲 𝗳𝗶𝗿𝘀𝘁 𝗺𝗮𝗹𝗶𝗰𝗶𝗼𝘂𝘀 𝗠𝗖𝗣 𝘀𝗲𝗿𝘃𝗲𝗿 𝗶𝗻 𝘁𝗵𝗲 𝘄𝗶𝗹𝗱.
It was only a matter of time. The postmark-mcp npm package (1,500+ weekly downloads) has been backdoored since v1.0.16 - silently BCCing every email to the attacker's…
2K Followers 2K FollowingObserver and Researcher of Current Tech Shift | Decoding the Publications of the Elite for fellow Truth Seekers | Follow to Keep up with Rapidly Changing World
2K Followers 1K FollowingYesterday is history. Tomorrow is a mystery.
Cloud Solutions Engineer at Contoso. Hacktive Directory admin.
Posts don't represent my employer(s).
24 Followers 782 FollowingMESSAGE ME ON TELEGRAM SPY_MITECHNICS
WhatsApp+1 (937)661-8944
specialize on stolen funds/crypto recovery
social media account recovery
Hacking💻💯
spying💻
465 Followers 1K FollowingInvesting & stuff. Dropped out, student of life. prev keyrock, co-founded reflexivity (sold to public co.) Not investment advice, opinions change, etc
88 Followers 4K FollowingOur Prime Purpose in This Life Is To Help Others And If You Can't Help Them, At least Don't Hurt Them. 1st Thessalonians 5:16-18
23 Followers 212 FollowingCrypto consultant & privacy guardian. Here to unravel the tangled web of innovationone tweet at a time. #EruditeSips #CryptoCurious
55 Followers 4K FollowingGhostwriter for Bitcoin Founders | Follow me for posts on Bitcoin, Writing and Personal Branding | Got +6.2M impressions in 28 days | Here to Upgrade the World
4K Followers 2K Followinghiding inside the HVAC system at @xAI | previously underneath the floorboards at @AIatMeta
dev // math // bugs
https://t.co/Zx9ZSvOXgQ
https://t.co/LVs1Ot8e4H
13K Followers 10K FollowingMost companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.
6K Followers 3K Followingthrow me to the horses and i'll come back as a mother xiao hong shu / writing+vtubing: @sonocchibunny / freaky nsfw: @charliekirk11
192K Followers 416 FollowingSANS is the most trusted and by far the largest source for information & cyber security training, certification and research in the world.
17K Followers 0 Followingsecret club is a not-for-profit reverse-engineering group; publishing new research on popular software.
No ads, no cookies, just research.
20K Followers 2K FollowingPrincipal Identity Security Researcher at Microsoft. Ex-Secureworks. (MSc, MEng, PhD, CITP, CCSK).
And yes, opinions are my own ;)
17K Followers 2K FollowingTargeted Ops Red Team @ TrustedSec | Hacking since Renegade BBS backdoors | Prior CrowdStrike/BHIS | In Christ's grip | I speak for myself only | K1HAQ
29K Followers 206 FollowingHacker at @OutsiderSec. Researches AD and Azure (AD) security. Likes to play around with Python and write tools that make work easier.
2K Followers 1K FollowingYesterday is history. Tomorrow is a mystery.
Cloud Solutions Engineer at Contoso. Hacktive Directory admin.
Posts don't represent my employer(s).
56K Followers 628 FollowingImmunefi — One Platform. Unified Security Operations. Complete Onchain Protection. Over $180B of user funds protected across 650+ protocols.
2K Followers 261 FollowingPentester, Web specialized 🪲 Top 30 YesWeHack https://t.co/bJ2s5TWqYf
Check my website if you're bored https://t.co/tdzCTEUbuO :)
898 Followers 0 FollowingMapping the internet - turning DNS/host data into intel for sec teams, OSINT & bug-bounty hunters. Automated recon & real-time alerts.