n0ps

199 posts

n0ps banner
n0ps

n0ps

@n0ps3

Staff Mobile Security Architect at ________ 📱🦄 Trail running ⛰️🏃

Katılım Ağustos 2020
666 Takip Edilen366 Takipçiler
n0ps
n0ps@n0ps3·
@L0Psec 🙏🏼 thanks! Definitely sad to have a company unresponsive even with a dedicated form for communicating security issues.
English
0
0
1
62
L0Psec
L0Psec@L0Psec·
@n0ps3 Really cool analysis! Sucks that they were unresponsive.
English
1
0
2
111
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
Only ESET detected "HyperVPN.apk": 25979f5e1dd7fb7a03fcb7c3d6a85d1286199739254585b17ced93ca217930d6 From: https://vpn-for-you[.]com/ -> https://vpn-for-you[.]com/HyperVPN.apk
MalwareHunterTeam tweet mediaMalwareHunterTeam tweet media
English
3
5
21
9.2K
n0ps retweetledi
Patrick Wardle
Patrick Wardle@patrickwardle·
Looking for some weekend reading? I recently published a deep technical dive into *all* the new macOS malware of 2024 🍎🐛 The report covers: 💉 Infection vectors 💾 Persistence mechanisms 🔓 Capabilities & features 🛡️ Detection methods Check it out! 👇 objective-see.org/blog/blog_0x7D…
English
4
59
167
12K
n0ps retweetledi
atc1441
atc1441@atc1441·
Lets check out the System Loco HGD4 Industrial Cellular connected GPS Tracker that you can get used for ~20€ Many useful parts inside that are "easy" hackable if you wanna take the route of making a custom firmware nRF52840 + more Video now online here: youtube.com/watch?v=-UQDqF…
YouTube video
YouTube
atc1441 tweet media
English
3
15
140
9.4K
n0ps retweetledi
atc1441
atc1441@atc1441·
Full custom firmware on the SR08 BLE Smart Ring goes Brrrrr... s.click.aliexpress.com/e/_op8fMC1 What a pain to develop for the DA14585 SoC🥲 but works! Demo Firmware allows OTA and a simple counter Source is available here: github.com/atc1441/ATC_SR… Flashing on your own risk!
English
10
30
303
20.7K
n0ps retweetledi
Moonlock Lab
Moonlock Lab@moonlock_lab·
1/11: Another day, another #backdoor! Our team started digging deep into the #macOS #malware sample (yet undetected on VirusTotal) shared by @bruce_k3tta, and surprisingly found out that it has the ability to execute arbitrary commands sent from C2 and capture screenshots.
Moonlock Lab tweet media
English
2
20
85
9.1K
n0ps retweetledi
L0Psec
L0Psec@L0Psec·
New RE Blog Post: kandji.io/blog/kitty-ste… Potential stealer in the making, we named Purrglar: Targets Chrome/Exodus, uses Security Framework APIs for Keychain access attempt (prompts the user), and leverages curl APIs. Was fun, a lot of arm64 instruction coverage in the blog :)
English
1
35
121
7.4K
n0ps retweetledi
Baptiste Robert
Baptiste Robert@fs0c131y·
Worried about a TikTok ban? Americans are now flocking to Xiaohongshu (REDnote), another Chinese app. Spoiler: Yes, it tracks its users. Time to dive in! ⬇️
Baptiste Robert tweet media
English
47
221
1.5K
199.7K
n0ps
n0ps@n0ps3·
@MasterMike88 Any chance that Frida works on iPadOS 18.0+ or still facing root process spawning issue?
English
0
0
0
172
Michael
Michael@MasterMike88·
palera1n works on iPadOS 18.2 beta 3. However, tvOS 18.2 beta 2 implements SSV Implications: - rootless should work without a palera1n update (but there’s no strap in palera1n loader currently) - rootful might work if you create a fakefs first, but that hasn’t been tested)
Michael tweet media
English
3
7
60
29.1K
n0ps retweetledi
8kSec
8kSec@8kSec·
🚨🚨🚨Big Announcement! Introducing On-Demand Mobile Security Courses🚀 We’re thrilled to announce the start of pre-registration for our On-Demand Courses! At 8kSec Academy, you can advance your Mobile Security skills and earn certifications anytime, from anywhere🌍 Available Courses for Pre-Registration: ‣ Offensive Mobile Reversing and Exploitation (24Hrs of Content, 167 videos) ‣ Practical Mobile Application Exploitation (22Hrs of Content, 140 videos) ‣ Offensive iOS Internals (13Hrs of Content, 92 videos) ‣ Offensive Android Internals (10Hrs of Content, 69 videos) Enroll early and unlock exclusive benefits: 🔹Special Early Bird Pricing – the best rates available, exclusively for early registrants 🔹Extended 15-Month Access – enjoy an extra 3 months to learn at your own pace, with continuous course updates 📖Explore full course details and pre-register now: academy.8ksec.io 📚Learn more about the announcement here: 8ksec.io/on-demand-mobi… 🗓️Courses open for Pre-Registered Students on November 20, 2024. Secure your spot now and get ready to elevate your skills in #MobileSecurity, #Jailbreak, and #MobileExploitation. Follow @8ksec for more such updates.
8kSec tweet media
English
1
23
68
6.7K
radare
radare@radareorg·
Welcome back! Now @bezjaje will be talking about #frida hooks on non jailbroken iOS devices. Hope you enjoy it! #r2con2024
radare tweet media
English
1
18
132
8.1K
n0ps retweetledi
Jiska
Jiska@naehrdine·
Let's reverse engineer a machine learning app on iOS! The Hotdog app can detect hotdogs 🌭, is there a chance to change it into a pizza 🍕 detector app? youtu.be/e2kosWm2vag
YouTube video
YouTube
Jiska tweet media
English
1
18
78
8.6K
n0ps retweetledi
radare
radare@radareorg·
❄️ Announcing the Advent Of Radare2! ❄️ Stay tuned for the 1st of December! radare.org/advent/
radare tweet media
English
1
48
205
12.9K
n0ps retweetledi
Objective-See Foundation
Objective-See Foundation@objective_see·
Stoked that there will be an Apple-themed Capture the Flag (CTF) event at #OBTS v7.0 🤗🏴‍☠️ Interested in participating (or submitting a challenge)?Register here: docs.google.com/forms/d/e/1FAI… And a big mahalo to @gutterchurl & @iamevltwin for putting together the CTF again! 🙏🏽
Objective-See Foundation@objective_see

We ♥️ Capture the Flag (CTF) Thanks to @gutterchurl & @iamevltwin (and @PaloAltoNtwks) this year featured the very first ever #OBTS CTF! ⛳️👩🏻‍💻👨🏻‍💻 Attendees & students teamed up and competed to crack iOS & macOS themed challenges, to win both prizes and bragging rights!

English
0
8
40
7.3K
n0ps retweetledi
Tony Gorez
Tony Gorez@tonygo_·
After my previous post, I recieved a few comments about ptrace! I was curious and decided to explore this new track. In the post: ➡️ I used ptrace to prevent debugger attaching my program ➡️ I dived into xnu sources to reverse-engineer ptrace ⬇️⬇️⬇️⬇️ tonygo.tech/2024/anti-debu…
Tony Gorez tweet media
English
2
2
15
1.6K
n0ps retweetledi
radare
radare@radareorg·
After so much testing with different prompts and models, ended up wording a good query for decompiling with r2ai/decai. The first screenshot shows the result for: Claude3.5, Gpt4o and Qwen2.5 (local) for a password checking function in Swift.
radare tweet media
English
1
11
32
2.6K