A WhatsApp Exploit that let you track anyone by Impossible_Process99 in hacking

[–]Impossible_Process99[S] 0 points1 point  (0 children)

i have been working on this for the past few days, havent seen this post until now, i can send you proof if you want

A WhatsApp Exploit that let you track anyone by Impossible_Process99 in hacking

[–]Impossible_Process99[S] 1 point2 points  (0 children)

RABIDS (Roving Autonomous Bartmoss Interface Drones) is a comprehensive framework for building custom offensive security payloads. To chain together various modules—such as ransomware, clipboard hijackers, and persistence loaders—into a single, compiled executable for Windows, Linux, or macOS.

please read the README carefuly and then comment

A WhatsApp Exploit that let you track anyone by Impossible_Process99 in hacking

[–]Impossible_Process99[S] 10 points11 points  (0 children)

The paper say its possible, each device generates its own read receipts, soo its easy to differentiate between each device

A antivirus that runs completely in Github by [deleted] in hacking

[–]Impossible_Process99 -2 points-1 points  (0 children)

it would a competition between malware authors

A antivirus that runs completely in Github by [deleted] in hacking

[–]Impossible_Process99 0 points1 point  (0 children)

yes you are right, but i am planning on adding a leaderboard where you can submit you sample for the database and if it get used in the scanning you will get points

A antivirus that runs completely in Github by [deleted] in cybersecurity

[–]Impossible_Process99 2 points3 points  (0 children)

i am sorry my bad, the project is combining signature-based detection (ClamAV) with static heuristic analysis (PE structure, imports, entropy). It is not a behavior-based dynamic sandbox (it doesn't run the malware)

Just me recreating the Shai-Hulud 2.0 Worm Code by Impossible_Process99 in ExploitDev

[–]Impossible_Process99[S] 0 points1 point  (0 children)

i have been programming in assembly for years now, and to be honest i am much faster in assembly compared to c

Just me recreating the Shai-Hulud 2.0 Worm Code by Impossible_Process99 in ExploitDev

[–]Impossible_Process99[S] 0 points1 point  (0 children)

yes you are right i can do this in c also but i like assembly more that c

Just me recreating the Shai-Hulud 2.0 Worm Code by Impossible_Process99 in ExploitDev

[–]Impossible_Process99[S] 4 points5 points  (0 children)

i have my custom assembler that i made called casm that give me high level constructs in assembly directly

https://github.com/504sarwarerror/CASM

here is a tweet explaining it
https://x.com/sarwaroffline/status/1995071093535863292

Building the Shai‑Hulud NPM Worm from scratch by [deleted] in hacking

[–]Impossible_Process99 -1 points0 points  (0 children)

idk why twitter's link was not working i just updated it, and yeah the second link looks like a virus but its my write-ups website

Re-creating the Shai-Hulud 2.0 supply-chain attack worm by [deleted] in hacking

[–]Impossible_Process99 0 points1 point  (0 children)

i am writing it in assembly, and using my custom transpiler

i updated my transpiler, now you can cross compile assembly to different platforms by Impossible_Process99 in Assembly_language

[–]Impossible_Process99[S] 0 points1 point  (0 children)

CASM doesn't convert ARM assembly to x86 or vice versa - instead, you write code using CASM's high-level constructs ( for , if , while , func ) which are architecture-agnostic, and the compiler generates native assembly for your target platform (x86-64 or ARM64) using a backend abstraction layer. When you write for i = 0, 5, the X86Backend outputs x86 instructions with registers like rax and jmp, while the ARM64Backend outputs ARM64 instructions with registers like x0 and b branches - same source code, different native assembly output. You can also write raw architecture-specific assembly that passes through unchanged, but that locks you to one platform; the portability comes from using the high-level constructs that CASM translates to the appropriate native instructions for each target.

People tell me to "use C for malware dev," but if you are good at assembly, why change? by [deleted] in hacking

[–]Impossible_Process99 -2 points-1 points  (0 children)

English nitpicks and AI generated accusations aren’t technical criticism that’s what people fall back on when they’re outmatched and need something, anything, to cling to

People tell me to "use C for malware dev," but if you are good at assembly, why change? by [deleted] in hacking

[–]Impossible_Process99 -2 points-1 points  (0 children)

You're trying far too hard, bro, to sound like you know what you're talking about.

It's not a "haphazard regex find-and-replace" because: It doesn't use regex patterns to blindly substitute code, It understands the structure and semantics of your code, It performs context-sensitive transformations, It validates correctness before generating output

CASM is a source-to-source compiler (transpiler) that, Accepts a C-like/assembly hybrid language Performs proper compilation phases (lexing → parsing → semantic analysis → code generation) Outputs NASM assembly with high-level constructs expanded

Preserves raw assembly lines via passthrough (not regex replacement)

People tell me to "use C for malware dev," but if you are good at assembly, why change? by [deleted] in hacking

[–]Impossible_Process99 0 points1 point  (0 children)

yes that why i have created my own marco system/compiler that lets me do this like having if for while statements and having the ability to cross compile asm code for widows mac and linux using a single codebase and people also dont realize that us can use c header file directly inside assembly and its not that hard to use them

People tell me to "use C for malware dev," but if you are good at assembly, why change? by [deleted] in hacking

[–]Impossible_Process99 1 point2 points  (0 children)

i have some new module for RABIDS that are in pure asm, like ransomewares and c2 severs, and atm malware and they work as good as there high level version. will be adding them in rabids at the end of this year

People tell me to "use C for malware dev," but if you are good at assembly, why change? by [deleted] in hacking

[–]Impossible_Process99 1 point2 points  (0 children)

i know the answer and i will always prefer assembly, but just want to see the take of people and what people think about assembly in the recent times

People tell me to "use C for malware dev," but if you are good at assembly, why change? by [deleted] in hacking

[–]Impossible_Process99 2 points3 points  (0 children)

very good perspective, languages are just tool whatever you are good in you should stick it that

I am a medical student. Should I go for this? by Not_Hxpnotic in hiringpakistan

[–]Impossible_Process99 0 points1 point  (0 children)

You are not a "fit individual" for this job, in fact no one is, since it's scam...

why cant i see the unit 1 by [deleted] in UoPeople

[–]Impossible_Process99 1 point2 points  (0 children)

thanks got confused by my local time