Your Windows 11 Computerโs Hidden Spy: The Dark Truth About TPM Chips
https://www.youtube.com/watch?v=t1eX_vvAlUc
https://www.youtube.com/watch?v=t1eX_vvAlUc
YouTube
Your Windows 11 Computerโs Hidden Spy: The Dark Truth About TPM Chips
If you're running Windows 11, your computer has a TPM Chip Version 2.0. This is one of the requirements to using Windows 11 and of course Windows 10 has been declared as "End-Of-Life". While you think that Windows 11 is an improvement, wait till you findโฆ
Forwarded from Gizchina.com
GMKtec NucBox M7 Ultra Unveiled: A Compact Powerhouse with Ryzen 7 PRO https://www.gizchina.com/computers-tech/gmktec-nucbox-m7-ultra-unveiled-a-compact-powerhouse-with-ryzen-7-pro
Gizchina
GMKtec NucBox M7 Ultra Unveiled: A Compact Powerhouse with Ryzen 7 PRO
GMKtec launches the NucBox M7 Ultra Mini PC with Ryzen 7 PRO 6850U, Radeon 680M, 8K quad display, USB4 ports, and pro-grade performance.
Forwarded from Wild Kernels Bot
๐ฝ New Kernel ๐งช Pre-Release Uploaded
๐ฆ Repository: WildKernels/GKI_KernelSU_SUSFS
โ๏ธ Commit: 2809bf3d6aa051b70fd86ad3e6445bd275e77985
๐ View GitHub Release
๐ฆ Repository: WildKernels/GKI_KernelSU_SUSFS
โ๏ธ Commit: 2809bf3d6aa051b70fd86ad3e6445bd275e77985
๐ View GitHub Release
GitHub
GitHub - WildKernels/GKI_KernelSU_SUSFS: GKI Kernels with KernelSU & SUSFS
GKI Kernels with KernelSU & SUSFS. Contribute to WildKernels/GKI_KernelSU_SUSFS development by creating an account on GitHub.
Forwarded from The Hacker News
๐จ PhantomRaven hit the npm registry โ 126 malicious packages, 86K+ installs, stealing npm tokens, GitHub creds, and CI/CD secrets.
They hide malware in remote dynamic dependencies that show 0 deps, so scanners miss them.
Details โ https://thehackernews.com/2025/10/phantomraven-malware-found-in-126-npm.html
They hide malware in remote dynamic dependencies that show 0 deps, so scanners miss them.
Details โ https://thehackernews.com/2025/10/phantomraven-malware-found-in-126-npm.html
Forwarded from It's FOSS
I have found the โBazaarโ for all your flatpak needs. ๐ค๐
https://www.youtube.com/watch?v=Pod_KQE7VIU
https://www.youtube.com/watch?v=Pod_KQE7VIU
YouTube
Bazaar: The Best Flatpak App Store You Are Not Using
๐๏ธ Discover Bazaar โ A Fresh App Store for Flatpaks on Linux
Recently I came across a new Software Center app made specially for Flatpaks and itโs called Bazaar (meaning market).
Itโs like a marketplace where you can explore, install, and manage Flatpakโฆ
Recently I came across a new Software Center app made specially for Flatpaks and itโs called Bazaar (meaning market).
Itโs like a marketplace where you can explore, install, and manage Flatpakโฆ
Forwarded from Bones' Tech Garage
BleepingComputer
Google disputes false claims of massive Gmail data breach
Google was once again forced to announce that it had not suffered a data breach after numerous news outlets published sensational stories about a fake breach that purportedly exposed 183 million accounts.
Forwarded from The Hacker News
โก Cybercrime just got quieter, cheaper, and a lot more precise.
๐ฅ DNS flaws exploited
๐ฅ Rust binaries hiding payloads
๐ฅ Supply-chain heists rising
๐ฅ New RATs everywhere
Your weekly ThreatsDay recap has it all โ https://thehackernews.com/2025/10/threatsday-bulletin-dns-poisoning-flaw.html
๐ฅ DNS flaws exploited
๐ฅ Rust binaries hiding payloads
๐ฅ Supply-chain heists rising
๐ฅ New RATs everywhere
Your weekly ThreatsDay recap has it all โ https://thehackernews.com/2025/10/threatsday-bulletin-dns-poisoning-flaw.html
Forwarded from Wild Kernels Bot
๐ฝ New Kernel ๐งช Pre-Release Uploaded
๐ฆ Repository: WildKernels/GKI_KernelSU_SUSFS
โ๏ธ Commit: 280674d15399186359942920321b6c69df6d7e94
๐ View GitHub Release
๐ฆ Repository: WildKernels/GKI_KernelSU_SUSFS
โ๏ธ Commit: 280674d15399186359942920321b6c69df6d7e94
๐ View GitHub Release
GitHub
GitHub - WildKernels/GKI_KernelSU_SUSFS: GKI Kernels with KernelSU & SUSFS
GKI Kernels with KernelSU & SUSFS. Contribute to WildKernels/GKI_KernelSU_SUSFS development by creating an account on GitHub.
Forwarded from Wild Kernels Bot
Wild_KSU_v0.0.179_13974-release.apk
17.4 MB
๐ง CI Manager (TEST BUILD) #ci_3774
๐
๐ Commit:
๐ Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18941344493
๐
๐ Commit:
๐ Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18941344493
Wild_KSU_v0.0.179-spoofed_13974-release.apk
17.4 MB
๐ง Spoofed Manager (TEST BUILD) #spoofed_3774
๐
๐ Commit:
๐ Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18941344493
๐
๐ Commit:
๐ Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18941344493
Forwarded from Libreware
How to run #ADB and #fastboot in #Termux without root to unlock #bootloader, run ADB commands, remove #bloatware, flash ROM, or even root another #Android
https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/:
1. It supports debloating of various manufacturers and mobile carriers such as LG, Samsung, Xiaomi, Huawei, Oppo, Realme, Vivo, ZTE, OnePlus, Nokia, Sony, Asus, Google, Fairphone, Motorola, Tecno, Unihertz.
2. Full access to the appโs private storage โ including databases, tokens, cached credentials, config files, or even offline user data.
3. Another common issue in AndroidManifest.xml is this flag: When enabled (which it is by default unless explicitly disabled), Android allows the appโs private data to be backed up via ADB โ again, even on non-rooted devices.
Android
https://github.com/nohajc/termux-adb
Android debloater for pc and debloat lists
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
#debloat
https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/:
1. It supports debloating of various manufacturers and mobile carriers such as LG, Samsung, Xiaomi, Huawei, Oppo, Realme, Vivo, ZTE, OnePlus, Nokia, Sony, Asus, Google, Fairphone, Motorola, Tecno, Unihertz.
2. Full access to the appโs private storage โ including databases, tokens, cached credentials, config files, or even offline user data.
3. Another common issue in AndroidManifest.xml is this flag: When enabled (which it is by default unless explicitly disabled), Android allows the appโs private data to be backed up via ADB โ again, even on non-rooted devices.
Android
https://github.com/nohajc/termux-adb
Android debloater for pc and debloat lists
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
#debloat
Mobile Hacker
How to Run ADB and Fastboot on a Non-Rooted Android Smartphone Using Termux
Thanks to Termux and the clever termux-adb project, you can run ADB and Fastboot directly from your phone โ no computer needed. This guide breaks down how to install it, how it works, and practical use cases.
Forwarded from Libreware
Universal Android Debloater Next Generation
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
This is a detached fork of the UAD project, which aims to improve privacy and battery performance by removing unnecessary and obscure system apps. This can also contribute to improving security by reducing (but not eliminating) the attack surface. Read the wiki for more details on getting started. Whilst UAD-ng can remove system apps, it cannot detect or remove potentially malicious system services or drivers baked into the firmware of your device by various vendors; some vendor-specific apps are only UI front-ends to vendor-provided system services, and as such disabling/uninstalling those apps will not stop a service from running. Additional information can be found in package descriptions inside the Universal Android Debloater Next Generation application.
#Android #debloat #UADNG
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
This is a detached fork of the UAD project, which aims to improve privacy and battery performance by removing unnecessary and obscure system apps. This can also contribute to improving security by reducing (but not eliminating) the attack surface. Read the wiki for more details on getting started. Whilst UAD-ng can remove system apps, it cannot detect or remove potentially malicious system services or drivers baked into the firmware of your device by various vendors; some vendor-specific apps are only UI front-ends to vendor-provided system services, and as such disabling/uninstalling those apps will not stop a service from running. Additional information can be found in package descriptions inside the Universal Android Debloater Next Generation application.
#Android #debloat #UADNG
GitHub
GitHub - Universal-Debloater-Alliance/universal-android-debloater-next-generation: Cross-platform GUI written in Rust using ADBโฆ
Cross-platform GUI written in Rust using ADB to debloat non-rooted Android devices. Improve your privacy, the security and battery life of your device. - Universal-Debloater-Alliance/universal-andr...
Forwarded from Android Security & Malware
[beginners] Deep dive into Android Pentesting
Covered everything from static & dynamic analysis, Frida, Drozer, SSL pinning bypass, deep links, broadcast receivers, and more
If you're into mobile security, this one's packed with real-world scenarios & tools
https://coal-memory-97b.notion.site/Android-Pentest-1f6923af30cc80bdafa4f3c581f4c5f8
Covered everything from static & dynamic analysis, Frida, Drozer, SSL pinning bypass, deep links, broadcast receivers, and more
If you're into mobile security, this one's packed with real-world scenarios & tools
https://coal-memory-97b.notion.site/Android-Pentest-1f6923af30cc80bdafa4f3c581f4c5f8