IRIS C2

970 posts

IRIS C2 banner
IRIS C2

IRIS C2

@C2IRIS

The world's most advanced offensive cyber platform

McLean, VA Katılım Ocak 2025
144 Takip Edilen2.5K Takipçiler
Sabitlenmiş Tweet
IRIS C2
IRIS C2@C2IRIS·
We are putting together a CTF team at IRIS C2 Looking for a top-notch group of 4 people to begin with If you’re located in the DMV region, that’s a bonus If you’re interested, send along your info to CTO@IRISC2[.]com
English
3
1
19
13.3K
IRIS C2
IRIS C2@C2IRIS·
@Robert4787 What’s unreal about any of that? It’s pretty run of the mill cyber statecraft, tbh
English
0
0
0
46
Robert Morton
Robert Morton@Robert4787·
This is where spycraft starts to feel unreal. It’s not just agents anymore, it’s hacked cameras, AI, and years of tracking someone’s every move. By the time a strike happens, it’s already been decided long before. chosun.com/english/world-…
English
2
28
55
2K
IRIS C2
IRIS C2@C2IRIS·
@Cernovich We have all the satellite imagery that we want
English
0
0
0
197
Cernovich
Cernovich@Cernovich·
Chinese telegram groups are posting real time satellite images. We are two weeks behind, per a government mandate ordering satellite companies to withhold updates for at least 14 days.
john m@johnm11088928

@Cernovich I can't get a good read on the Iran conflict on X.

English
52
251
3.2K
282.1K
IRIS C2
IRIS C2@C2IRIS·
These days, if you have the budget to spend an average of $10K per day on commercial satellite data, then you can know almost anything about the world, assuming that you have the requisite supplies of excess computational and analytical wherewithal
English
0
0
0
127
IRIS C2
IRIS C2@C2IRIS·
Fuzzing is more of an art than a science
English
2
0
15
1K
IRIS C2
IRIS C2@C2IRIS·
@NetAskari The samples aren't very compelling, tbh
English
1
0
10
7.8K
NetAskari
NetAskari@NetAskari·
We wrote up a compile of the recent news of the alleged massive leak of internal, military grade tech data from China's National Super Computer Center in Tianjin. 1/3
NetAskari tweet media
English
7
120
874
68.5K
IRIS C2
IRIS C2@C2IRIS·
I will say this about Apple: They do tend to use compiler settings that prevent many bugs from being exploitable that otherwise would be, given certain optimization conditions
English
1
0
10
1K
Voidwalker
Voidwalker@JustWantToQ1·
Those people are typically called programmers but someone else will argue it's more than just knowing the code and understanding people enough too to make it a weaponizable turn key solution. This is why the people in question often come in teams. You'll have someone like me who designs the ui for NPC gov users and like 3 people bug hunting in the background who bring 2 other middle pipeline people things to chain together into something practical and useful for me to educate potential clients about.
English
1
0
3
156
IRIS C2
IRIS C2@C2IRIS·
The top performing vulnerability research firms stay on top year after year because they extrapolate the genius insights of their most brilliant people into robust internal tooling that makes seemingly unlikely discoveries become very repeatable.
English
2
1
18
1.6K
H4x0r.DZ 🇰🇵
H4x0r.DZ 🇰🇵@h4x0r_dz·
Fun fact: 90% of the Web3 bug bounty programs are scams they list huge reward amounts mainly as a marketing tactic.
f4lc0n@al_f4lc0n

I Saved Injective's $500M. They Pay Me $50K. I like hunting bugs on @immunefi . I'm decent at it. - #1 — Attackathon | Stacks - #2 — Attackathon | Stacks II - #1 — Attackathon | XRPL Lending Protocol - 1 Critical and 1 High from bug bounties (not counting this one) Life was good. Then I found a Critical vulnerability in @injective . This vulnerability allowed any user to directly drain any account on the chain. No special permissions needed. Over $500M in on-chain assets were at risk. I reported it through Immunefi. The next day, a mainnet upgrade to fix the bug went to governance vote. The Injective team clearly understood the severity. Then — silence. For 3 months. No follow up. No technical discussion. Nothing. A few days ago, they notified me of their decision: $50K. The maximum payout for a Critical vulnerability in their bug bounty program is $500K. I disputed it. Silence again. No explanation for the reduced payout. No explanation for the 3 month ghost. No conversation at all. To be clear: the $50K has not been paid either. I've seen others share bad experiences with bug bounty payouts recently. I never thought it would happen to me. I can't force them to do the right thing. But I won't let this be forgotten. I will dedicate 10% of all my future bug bounty earnings to making sure this story stays visible — until Injective pays what I deserve. Full Technical Report: github.com/injective-wall…

English
14
6
174
17.8K
IRIS C2
IRIS C2@C2IRIS·
We are looking to hire another very talented iOS exploit/implant developer Careers@IRISC2[.]com
English
0
2
26
4.4K
IRIS C2
IRIS C2@C2IRIS·
And no. Not even lockdown mode stops this. Credit where credit is due. This is one of the very best engineered exploit kits ever created, by far. It even gives our stuff in IRIS C2 a run for its money.
English
1
0
46
2.8K
IRIS C2
IRIS C2@C2IRIS·
There is not a single iPhone on earth right now that’s secure against 1-clicks (which can also be delivered to webpages via targeted ads) if Russia or China want to hack you. There’s even a phony shut down module. So when you think you’ve powered off your phone, it’s still on.
English
1
1
41
3.1K
IRIS C2
IRIS C2@C2IRIS·
There is a leaked Coruna version being used against iOS 26.3 at present, btw Google, et al just haven’t released their report on it because Apple hasn’t been able to patch yet “Responsible disclosure” usually = creepy, vague lying to the public via omission & half truths
English
14
26
295
22.1K
IRIS C2
IRIS C2@C2IRIS·
Photonic computing is the future. Bookmark this.
English
1
0
4
498
IRIS C2
IRIS C2@C2IRIS·
@h4x0r_dz IDA pro is also great, but I find Binary Ninja to be better. Its API makes it ideal for AI-assisted investigation of potential exploitation surfaces. And it has firmware and iOS related tooling that I’ve found to be truly superior.
English
0
0
8
583
IRIS C2
IRIS C2@C2IRIS·
Finally bought Binary Ninja today Absolutely tremendous product Obviously built by total craftsmen Well worth the $3,000
English
2
3
84
8K
IRIS C2
IRIS C2@C2IRIS·
@FCE365 Very well written. Nice work
English
1
0
2
339
GeoSn0w
GeoSn0w@FCE365·
How iOS App Hacks Work: Using __got and __la_symbol_ptr for iOS Hacking / Tweak Development 📲 Full Write-up: idevicecentral.com/ios-hacking/us… It's been a long time since I put together a write-up, but here it is. If you are curious how iOS tweaks work, how they change app behavior and where they hook stuff, this introduction to __got and __la_symbol_ptr on iOS will help you understand the picture better. Note: __got and __la_symbol_ptr are very similar to GOT and PLT in ELF (Linux / Android) binaries. Note #2: This write-up does NOT contain any AI generated material, you are reading a fully human written article.
GeoSn0w tweet media
English
2
8
67
5.7K