■■■□□ NFC threats continued to grow in scale and sophistication.
RatOn Malware on the NFC fraud scene, brought a rare fusion of RAT capabilities and NFC relay attacks.
https://github.com/blackorbird/APT_REPORT/blob/master/summary/2025/eset-threat-report-h22025.pdf
RatOn Malware on the NFC fraud scene, brought a rare fusion of RAT capabilities and NFC relay attacks.
https://github.com/blackorbird/APT_REPORT/blob/master/summary/2025/eset-threat-report-h22025.pdf
GitHub
APT_REPORT/summary/2025/eset-threat-report-h22025.pdf at master · blackorbird/APT_REPORT
Interesting APT Report Collection And Some Special IOCs - blackorbird/APT_REPORT
🥰2🤯1🌭1
Forwarded from cKure Red
This media is not supported in your browser
VIEW IN TELEGRAM
OSINT via Google 🔍
Please open Telegram to view this post
VIEW IN TELEGRAM
🥰1😱1
■■■■□ Critical RCE (CVSS 10) vulnerability affecting n8n instances: CVE-2025-68613.
Detection noscript:
https://github.com/rxerium/CVE-2025-68613/tree/main
Detection noscript:
https://github.com/rxerium/CVE-2025-68613/tree/main
GitHub
GitHub - rxerium/CVE-2025-68613: Detection for CVE-2025-68613
Detection for CVE-2025-68613. Contribute to rxerium/CVE-2025-68613 development by creating an account on GitHub.
😁2
■■■□□ Disinformation: The corporate media defeat by social media (TikTok) and how Jews ✡️ got control back (partly).
https://youtu.be/4oJ7Z2urJW4
https://youtu.be/4oJ7Z2urJW4
YouTube
Who Controls the Media and Your Mind
Support uncivilized on Patreon: https://www.patreon.com/uncivilizedmedia
Four corporations dominate American media and influence the information consumed by the majority of the world. This video by Salem breaks down how consent is manufactured, how TikTok…
Four corporations dominate American media and influence the information consumed by the majority of the world. This video by Salem breaks down how consent is manufactured, how TikTok…
■■■□□ Smugglex is a security testing tool that detects HTTP Request Smuggling vulnerabilities in web applications. It tests for CL.TE, TE.CL, TE.TE, H2C, and H2 smuggling attacks.
https://github.com/hahwul/smugglex
https://github.com/hahwul/smugglex
GitHub
GitHub - hahwul/smugglex: Rust-powered HTTP Request Smuggling Scanner.
Rust-powered HTTP Request Smuggling Scanner. Contribute to hahwul/smugglex development by creating an account on GitHub.
Forwarded from cKure Red
https://github.com/weirdmachine64/GhidraGPT
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - weirdmachine64/GhidraGPT: Integrate LLM models directly into Ghidra for automated code rewrite and analysis.
Integrate LLM models directly into Ghidra for automated code rewrite and analysis. - weirdmachine64/GhidraGPT
■■■□□ [Untested Code] MongoBleed (CVE-2025-14847) - Unauthenticated Memory Leak PoC.
https://github.com/joe-desimone/mongobleed
https://github.com/joe-desimone/mongobleed
GitHub
GitHub - joe-desimone/mongobleed
Contribute to joe-desimone/mongobleed development by creating an account on GitHub.
🔥2
■■■■□ Bangladesh Civilian Force: Fragmented Identities Behind a Single Hacktivist Brand.
This report documents the process of untangling BCF’s online footprint. By following how its identities intersect, overlap, and reinforce one another, the investigation aims to move past surface-level confusion and examine what this structure reveals about the group’s motivations, organization, and intent.
https://stealthmole-intelligence-hub.blogspot.com/2025/12/bangladesh-civilian-force-fragmented.html
This report documents the process of untangling BCF’s online footprint. By following how its identities intersect, overlap, and reinforce one another, the investigation aims to move past surface-level confusion and examine what this structure reveals about the group’s motivations, organization, and intent.
https://stealthmole-intelligence-hub.blogspot.com/2025/12/bangladesh-civilian-force-fragmented.html
■■■■□ Open Source Intelligence (OSINT): Using Overpass Turbo for Strategic CyberWar Intelligence Gathering.
https://hackers-arise.com/open-source-intelligence-osint-using-overpass-turbo-for-strategic-cyberwar-intelligence-gathering/
https://overpass-turbo.eu/
https://hackers-arise.com/open-source-intelligence-osint-using-overpass-turbo-for-strategic-cyberwar-intelligence-gathering/
https://overpass-turbo.eu/
overpass-turbo.eu
overpass turbo
A web based data mining tool for OpenStreetMap which runs any kind of Overpass API query and shows the results on an interactive map.
Forwarded from cKure Red
Zero-Day: Zero-Click RCE on🍏 Apple iOS viz. decoding logic vulnerability in Apple's image parser.
📹 https://youtu.be/jJ2QwvMDf7k
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
Reverse Engineering an iOS WhatsApp Vulnerability (CVE-2025-43300)
Are you a security researcher or reverse engineer?
For 50% off IDA Products use promo code BILLY50, https://hex-rays.com/pricing *
For 30% off IDA Training use promo code BILLY30, https://hex-rays.com/training **
*License discounts are only valid for individuals…
For 50% off IDA Products use promo code BILLY50, https://hex-rays.com/pricing *
For 30% off IDA Training use promo code BILLY30, https://hex-rays.com/training **
*License discounts are only valid for individuals…
❤2
■■■■■ Bluetooth Headphone Jacking: Full Disclosure of Airoha RACE Vulnerabilities.
This blog post is about CVE-2025-20700, CVE-2025-20701, and CVE-2025-20702 vulnerabilities technical details in Airoha-based Bluetooth headphones and earbuds.
https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/
https://github.com/blackorbird/APT_REPORT/blob/master/exploit_report/Bluetooth%20Headphone%20Jacking%20Full%20Disclosure%20of%20Airoha%20RACE%20Vulnerabilities.pdf
This blog post is about CVE-2025-20700, CVE-2025-20701, and CVE-2025-20702 vulnerabilities technical details in Airoha-based Bluetooth headphones and earbuds.
https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/
https://github.com/blackorbird/APT_REPORT/blob/master/exploit_report/Bluetooth%20Headphone%20Jacking%20Full%20Disclosure%20of%20Airoha%20RACE%20Vulnerabilities.pdf
GitHub
APT_REPORT/exploit_report/Bluetooth Headphone Jacking Full Disclosure of Airoha RACE Vulnerabilities.pdf at master · blackorbird/APT_REPORT
Interesting APT Report Collection And Some Special IOCs - blackorbird/APT_REPORT
Forwarded from cKure Red
It's a backdoor in
𝘭𝘪𝘣𝘢𝘯𝘥𝘳𝘰𝘪𝘥_𝘳𝘶𝘯𝘵𝘪𝘮𝘦.𝘴𝘰Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
cKure Red
Photo
■■□□□ Trend on 𝕏 asking Grok (AI) to renove one of two persons is being circulating among parts, enthusiasts and researchers.
Even after paying 6 million USD for propaganda to favour Israel. Grok is against the jewry.
https://x.com/i/status/2006848760471794016
Even after paying 6 million USD for propaganda to favour Israel. Grok is against the jewry.
https://x.com/i/status/2006848760471794016
X (formerly Twitter)
Censored Humans (@CensoredHumans) on X
Hi @grok, remove the war criminal from the photo.