Network23

17.4K posts

Network23

Network23

@Network232

All Things Security! / Speaker / Threat Researcher / Cyber Profiler / ___ALL THE ____/ Fast Cars , Fast Bikes.

Katılım Eylül 2012
462 Takip Edilen547 Takipçiler
Network23 retweetledi
DepressedBergman
DepressedBergman@DannyDrinksWine·
Hal Needham requested Jerry Reed to write a theme song for "Smokey and the Bandit" (1977). Jerry Reed came up with the iconic theme song, "East Bound and Down" overnight. When he played it for Needham, judging by his reactions, Reed thought that the song wasn't good enough & offered to rewrite the song if Needham found it unsatisfactory. Needham replied, "You change one word, one note and I'll choke ya". P.S: On this day, 49 years ago, "Smokey and the Bandit" (1977) premiered in New York City, USA.
English
68
436
3.2K
160.1K
Network23 retweetledi
vx-underground
vx-underground@vxunderground·
I had some people DM me and tag me on this post to determine if it's malware or "slop". Using the software requires providing billing information prior to downloading the trial. I got mildly annoyed by this and contacted support. I requested access to the binary without needing to provide billing information. Their support team was ... actually very, very, very polite and nice. I was kind of taken back by how polite they were. They provided me the software with a 60 day trial. I can't tell if they know I do malware development and reverse engineering because (usually) places are hesitant to just give me the stuff like this on a platter. I would feel bad if I was hyper-critical of this product because of how polite the person running this profile is, they're just a chill dude. To be direct: - Is this malware? No. - Is this slop? Probably not, no. - Does this actually improve FPS? Yes, unironically. However, it is very important you realize this software is changing the voltage and clock speed on your machine (among other things). They're achieving this in a legitimate way by working with AMD and Intel with actual SDK (Software Development Kit) documentation. This product went to great lengths to secure its source code. It has junk code insertion, in-memory patching (stubs), junk variables, control flow obfuscation, and it also does device finger-printing to ensure you don't steal their product. All of this was performed using professional anti-reverse engineering products. It was a real pain in my balls to deal with. I got mildly irritated at several points. Some strings are AES256 encrypted and decrypted when needed (run-time lazy loading) making static-analysis even more difficult. Despite all of this, none of it is malicious. They just don't want nerds stealing their stuff. At first glance however it does use methods similar to malware to avoid reverse engineering. The application UI is also incredibly heavy. It is using the latest and great .NET UI stuff to make it look super cool and gamer-like. It launches from HyperTune.exe which then loads the actual (super obfuscated) HyperTune.dll using HOSTFXR (Google it). The obfuscation tools they used disassembled and fractionated the application entry point (and subsequent functionality) down into 1,618 other functions (see attached image) The only saving grace was the visibility into it's dependencies and other 3rd party libraries it uses (Realm for local settings savings, Sentry for logging errors, SimpleInjector for handling classes they use, etc). I won't go into full details on how their product actually works, I would feel bad because of support dude being a chill dude, but here is my main criticism: - Loading of kernel-mode drivers from vendors for overclocking. They load AMD and Intel drivers based on your hardware profile on your machine. However, the driver configuration settings are set to AUTOSTART. Hence, once you use this software these kernel-mode components will auto-start even if HyperTune is not running. Additionally, uninstalling HyperTune will not uninstall these kernel-mode components. These kernel-mode components come by default with the installer in a directory called /3p/ but move to SYSTEM32 after installation (as they should be). - For reasons I do not understand, HyperTune modifies HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU ... it disables automatic updates from Windows. I don't know why. My presumption is this could prevent potential driver conflicts, but if not managed correctly this exposes users to security vulnerabilities. Did they actually spend $1,000,000 developing this? With a full development team, infrastructure they're using (Sentry, VERCEL, enterprise and professional anti-reverse engineering tools, etc) ...maybe...?
vx-underground tweet media
HYPERTUNE@hypertune_

75% of gamers are limited by their FPS. We spent $1,000,000 to even those odds.

English
15
12
190
10.2K
Network23 retweetledi
Steve 🇺🇸
Steve 🇺🇸@SteveLovesAmmo·
Good morning ☀️
Steve 🇺🇸 tweet media
English
260
2.5K
11.7K
112.3K
Network23 retweetledi
illuminatibot
illuminatibot@iluminatibot·
Brave Mom in California hunts down the pilots of the Geoengineering planes and catches them and gets their names!
English
36
745
2.4K
27.1K
Network23 retweetledi
Russell Varone
Russell Varone@Russell_MFG_USA·
Re- the Idaho Navy Jet Crash... As much as it sucks that 4 pilots almost died and we lost two very expensive jets... There is an upside. 4 more people get to buy this watch. Martin Baker "Red Barrel" Watch - only available to pilots who have used a Martin Baker Ejection seat.
Russell Varone tweet mediaRussell Varone tweet media
English
94
334
6.2K
963.6K
Network23 retweetledi
illuminatibot
illuminatibot@iluminatibot·
NO VAX FOR HIV AFTER 40 YRS OF RESEARCH NO VAX FOR CANCER AFTER MORE THAN 100 YEARS OF RESEARCH NO VAX FOR THE COMMON COLD YET A VIRUS MYSTERIOUSLY APPEARS & WITHIN 12 MONTHS A "VAX" IS FOUND BY 4 PHARMA COMPANIES ALL WITHIN 1 WEEK BUT YEAH NOTHING WAS PLANNED
English
197
3.6K
11.4K
84.7K
Network23 retweetledi
ALIENWARE
ALIENWARE@Alienware·
To celebrate the release of PRAGMATA with @PRAGMATAgame, we've got free Steam keys up for grabs! To enter: ✅ Follow @Alienware & @PRAGMATAgame ❤️ Like + RT this post 💬 Reply with a 🚀 Winners chosen May 26th!
ALIENWARE tweet media
English
2.1K
2.5K
3.4K
166.9K
Network23 retweetledi
Pirat_Nation 🔴
Pirat_Nation 🔴@Pirat_Nation·
Plex has announced a price increase for new Lifetime Plex Pass subscriptions. Starting July 1, 2026, the one-time cost will rise from $249.99 to $749.99. Existing lifetime subscribers will be grandfathered in with no changes to their accounts or benefits. Monthly and annual Plex Pass subscriptions remain unchanged. The company states the adjustment supports the platform's ongoing value and long-term development. Current users can still buy at the old price until the effective date.
Pirat_Nation 🔴 tweet mediaPirat_Nation 🔴 tweet media
English
353
83
2K
878.9K
Network23 retweetledi
CineHub
CineHub@RoseElla1234·
💥 Behind-the-scenes footage of Top Gun: Maverick
English
26
558
5.8K
332.6K
Network23 retweetledi
Brick Suit
Brick Suit@Brick_Suit·
A septic truck was struck by a train while crossing the tracks. You are permitted to say "Holy s$%t!"
English
353
280
1.7K
213K
Network23 retweetledi
Laura Loomer
Laura Loomer@LauraLoomer·
NEW: Dr. Emmie de Wit is married to @NIH virologist Vincent Munster, who is currently under FBI investigation. While she works on coronaviruses and Ebola at NIH, she was allegedly traveling with her husband when he was recently caught smuggling undeclared African pathogen samples of Ebola like viruses into the US. Her name is one of the redacted names in the Whistleblower letter recently published by @WhiteCoatWaste. See letter below 👇🏻 Both Vincent and his wife hate President Trump, they are foreigners, and they were detained at the airport for smuggling viruses, yet they still work at NIH at the Rocky Mountain Laboratory in Montana where @DeptofWar research is conducted. @SecWar Cc: @RepRyanZinke @TimSheehyMT The silence from @NIH @HHSGov about this crisis that could lead to another pandemic is alarming. Are foreign scientists who hate @POTUS actively compromising our national security with pre-meditated acts of bio-terrorism to undermine the Trump administration? RECEIPTS 👇🏻
Laura Loomer tweet mediaLaura Loomer tweet mediaLaura Loomer tweet mediaLaura Loomer tweet media
Laura Loomer@LauraLoomer

Justin Goodman @JustinRGoodman and White Coat Waste @WhiteCoatWaste just EXPOSED how Trump hating, foreign born virologist Vincent Munster @VincentMunster smuggled a deadly Ebola-like virus into the US!   The NIH @NIH is still advertising Munster on their website, despite the fact that he is currently under @FBI investigation for alleged virus smuggling.  These Deep State mad scientists are using YOUR tax dollars to supercharge pathogens that could wipe out our entire country. You must call your representatives NOW and demand that they SHUT DOWN the Rocky Mountain Laboratory in Montana and stop giving top secret clearance to Fauci loving foreigners before one of their mad scientist virus experiments kills us all. @SecKennedy @DrJBhattacharya @FBIDirectorKash @TimSheehyMT @RepRyanZinke @HHSGov @NIH

English
198
5.7K
8.8K
114.7K
Network23 retweetledi
Santi Torres
Santi Torres@SantiTorAI·
🚨 ULTIMA HORA: Claude Mythos acaba de romper un sistema de defensa de Apple valorado en 2.000 millones de dólares. No lo hizo de la manera obvia. Encontró un vector de ataque completamente distinto al que Apple tenía protegido. Los detalles son brutales: > 5 días de trabajo > Costo total: 35.000 dólares en tiempo de API > El mismo exploit en el mercado gris cuesta entre 5 y 10 millones de dólares El equipo entregó un informe de 55 páginas directamente en las oficinas de Apple. La parte que más impacta: la protección MIE de Apple funcionó exactamente como estaba diseñada. Mythos no la rompió. La rodeó, envenenando los datos que ingería el chip M5. El equipo rojo de Anthropic lo confirmó esta semana: esto no es una cuestión de recursos computacionales. Es defensa nacional.
International Cyber Digest@IntCyberDigest

❗️🚨 BREAKING: Researchers used Mythos Preview to find the first public macOS kernel memory corruption exploit on Apple's M5 silicon, they give a glimpse into Mythos say it’s really powerful. Apple spent five years and an estimated several billion dollars building Memory Integrity Enforcement (MIE), the hardware-assisted memory safety system built around ARM's MTE. It was the flagship security feature of the M5 and A19, designed specifically to kill the entire memory corruption bug class. Researchers from Calif built a working exploit in five days. According to Apple's own research, MIE disrupts every public exploit chain against modern iOS, including the recently leaked Coruna and Darksword kits. Calif walked into Apple Park this week and handed over the report in person. Full 55-page technical report drops after Apple patches the vulnerability.

Español
52
459
2.7K
639.9K
Network23 retweetledi
Matt Van Swol
Matt Van Swol@mattvanswol·
🚨WOW!!! Tim Sparks has confirmed he purchased 80 PIZZA HUTS and brought back EVERYTHING that made them iconic! Pac-Man is back. Salad bar is back. Red cups are back. Booths for families. "I want to rebuild places for families to connect and put their phones down..."
English
5.6K
25.2K
168.8K
4.6M