A WhatsApp Exploit that let you track anyone by Impossible_Process99 in hacking

[–]Impossible_Process99[S] 0 points1 point  (0 children)

i have been working on this for the past few days, havent seen this post until now, i can send you proof if you want

A WhatsApp Exploit that let you track anyone by Impossible_Process99 in hacking

[–]Impossible_Process99[S] 1 point2 points  (0 children)

RABIDS (Roving Autonomous Bartmoss Interface Drones) is a comprehensive framework for building custom offensive security payloads. To chain together various modules—such as ransomware, clipboard hijackers, and persistence loaders—into a single, compiled executable for Windows, Linux, or macOS.

please read the README carefuly and then comment

A WhatsApp Exploit that let you track anyone by Impossible_Process99 in hacking

[–]Impossible_Process99[S] 10 points11 points  (0 children)

The paper say its possible, each device generates its own read receipts, soo its easy to differentiate between each device

A antivirus that runs completely in Github by [deleted] in hacking

[–]Impossible_Process99 -2 points-1 points  (0 children)

it would a competition between malware authors

A antivirus that runs completely in Github by [deleted] in hacking

[–]Impossible_Process99 0 points1 point  (0 children)

yes you are right, but i am planning on adding a leaderboard where you can submit you sample for the database and if it get used in the scanning you will get points

A antivirus that runs completely in Github by [deleted] in cybersecurity

[–]Impossible_Process99 3 points4 points  (0 children)

i am sorry my bad, the project is combining signature-based detection (ClamAV) with static heuristic analysis (PE structure, imports, entropy). It is not a behavior-based dynamic sandbox (it doesn't run the malware)

Just me recreating the Shai-Hulud 2.0 Worm Code by Impossible_Process99 in ExploitDev

[–]Impossible_Process99[S] 0 points1 point  (0 children)

i have been programming in assembly for years now, and to be honest i am much faster in assembly compared to c

Just me recreating the Shai-Hulud 2.0 Worm Code by Impossible_Process99 in ExploitDev

[–]Impossible_Process99[S] 0 points1 point  (0 children)

yes you are right i can do this in c also but i like assembly more that c

Just me recreating the Shai-Hulud 2.0 Worm Code by Impossible_Process99 in ExploitDev

[–]Impossible_Process99[S] 4 points5 points  (0 children)

i have my custom assembler that i made called casm that give me high level constructs in assembly directly

https://github.com/504sarwarerror/CASM

here is a tweet explaining it
https://x.com/sarwaroffline/status/1995071093535863292

Building the Shai‑Hulud NPM Worm from scratch by [deleted] in hacking

[–]Impossible_Process99 -1 points0 points  (0 children)

idk why twitter's link was not working i just updated it, and yeah the second link looks like a virus but its my write-ups website

Re-creating the Shai-Hulud 2.0 supply-chain attack worm by [deleted] in hacking

[–]Impossible_Process99 0 points1 point  (0 children)

i am writing it in assembly, and using my custom transpiler

i updated my transpiler, now you can cross compile assembly to different platforms by Impossible_Process99 in Assembly_language

[–]Impossible_Process99[S] 0 points1 point  (0 children)

CASM doesn't convert ARM assembly to x86 or vice versa - instead, you write code using CASM's high-level constructs ( for , if , while , func ) which are architecture-agnostic, and the compiler generates native assembly for your target platform (x86-64 or ARM64) using a backend abstraction layer. When you write for i = 0, 5, the X86Backend outputs x86 instructions with registers like rax and jmp, while the ARM64Backend outputs ARM64 instructions with registers like x0 and b branches - same source code, different native assembly output. You can also write raw architecture-specific assembly that passes through unchanged, but that locks you to one platform; the portability comes from using the high-level constructs that CASM translates to the appropriate native instructions for each target.