■■■■□ Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime. 🔤🔤🔤🔤🔤🔤🔤 Currently, the application supports only Android libapp.so (arm64 only). Also, the application is currently working only against recent Dart versions. https://github.com/worawit/blutter
All posts by John Doe
April 20, 2025 at 12:45PM
■■■■■ Interesting thread. Malicious #NPM Campaign #Lazarus C2 Web Panel http://{IP}:1224/keys or /pdown + http://{IP}:1245/login + XAMPP + HTML Title = L-Administrator https://x.com/blackorbird/status/1912904527092785487
April 20, 2025 at 12:42PM
■■■■□ Compiled to WebAssembly so as to enable emulation of 64-bit Windows binaries within a browser environment. https://momo5502.github.io/emulator/
April 19, 2025 at 09:21PM
⚡️ Full Disclosure | A Hardware Zero-Day Drop: Bypassing Lock – Microchip/Atmel SAM4C32 📱https://wiki.recessim.com/view/ATSAM4C32 ▶️https://youtu.be/IOD5voFTAz8
April 19, 2025 at 07:30PM
■■■■■ Bypassing Windows Defender antivirus in 2025. Using Direct Syscalls and XOR encryption. https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-1/ https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-2/
April 19, 2025 at 07:29PM
■■■■■📍Everyone knows your location: Tracking myself down through in-app ads. https://timsh.org/tracking-myself-down-through-in-app-ads/ 📍Everyone knows your location, Part 2: Try it yourself and share the results. https://timsh.org/everyone-knows-your-location-part-2-try-it-yourself/ ➿➿➿➿➿➿➿➿➿➿ analyse-ad-traffic l: A guide + python notebook that helps to collect, analyse and visualise requests sent by a mobile device while using some app. https://github.com/tim-sha256/analyse-ad-traffic
April 19, 2025 at 05:27PM
■□□□□ CA/Browser Forum has approved a proposal to reduce the maximum validity of SSL/TLS certificates from the current 398 days to just 47 days by 2029. SSL/TLS Certificates Validity To Be Reduced From 398 Days to 47 Days
April 19, 2025 at 01:05PM
📝Bash script to find backdoors in FortiNet based on public IoC and symlinks. #!/bin/bash logfile=”check.txt” echo “[*] Backdoor Check Started: $(date)” > “$logfile” pause() { echo read -p “[Press Enter to continue to next step…]” echo } stage() { echo “==> $1” echo -e “\n==> $1” >> “$logfile” } # Stage 1: Check suspicious symlinks…
April 19, 2025 at 12:53PM
■□□□□ German state ditches Windows, Microsoft Office for Linux and LibreOffice. https://www.theregister.com/2024/04/04/germanys_northernmost_state_ditches_windows/
April 18, 2025 at 06:09PM
■■■■□ White House release on COVID-19 origins. 🦠 https://www.whitehouse.gov/lab-leak-true-origins-of-covid-19/
