Forwarded from It's FOSS
YouTube
Bazaar: The Best Flatpak App Store You Are Not Using
🛍️ Discover Bazaar — A Fresh App Store for Flatpaks on Linux
Recently I came across a new Software Center app made specially for Flatpaks and it’s called Bazaar (meaning market).
It’s like a marketplace where you can explore, install, and manage Flatpak…
Recently I came across a new Software Center app made specially for Flatpaks and it’s called Bazaar (meaning market).
It’s like a marketplace where you can explore, install, and manage Flatpak…
Forwarded from Bones' Tech Garage
BleepingComputer
Google disputes false claims of massive Gmail data breach
Google was once again forced to announce that it had not suffered a data breach after numerous news outlets published sensational stories about a fake breach that purportedly exposed 183 million accounts.
Forwarded from The Hacker News
⚡ Cybercrime just got quieter, cheaper, and a lot more precise.
💥 DNS flaws exploited
💥 Rust binaries hiding payloads
💥 Supply-chain heists rising
💥 New RATs everywhere
Your weekly ThreatsDay recap has it all → https://thehackernews.com/2025/10/threatsday-bulletin-dns-poisoning-flaw.html
💥 DNS flaws exploited
💥 Rust binaries hiding payloads
💥 Supply-chain heists rising
💥 New RATs everywhere
Your weekly ThreatsDay recap has it all → https://thehackernews.com/2025/10/threatsday-bulletin-dns-poisoning-flaw.html
Forwarded from Wild Kernels Bot
🌽 New Kernel 🧪 Pre-Release Uploaded
📦 Repository: WildKernels/GKI_KernelSU_SUSFS
✏️ Commit: 280674d15399186359942920321b6c69df6d7e94
🔗 View GitHub Release
📦 Repository: WildKernels/GKI_KernelSU_SUSFS
✏️ Commit: 280674d15399186359942920321b6c69df6d7e94
🔗 View GitHub Release
GitHub
GitHub - WildKernels/GKI_KernelSU_SUSFS: GKI Kernels with KernelSU & SUSFS
GKI Kernels with KernelSU & SUSFS. Contribute to WildKernels/GKI_KernelSU_SUSFS development by creating an account on GitHub.
Forwarded from Wild Kernels Bot
Wild_KSU_v0.0.179_13974-release.apk
17.4 MB
🔧 CI Manager (TEST BUILD) #ci_3774
📝
🔗 Commit:
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18941344493
📝
🔗 Commit:
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18941344493
Wild_KSU_v0.0.179-spoofed_13974-release.apk
17.4 MB
🔧 Spoofed Manager (TEST BUILD) #spoofed_3774
📝
🔗 Commit:
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18941344493
📝
🔗 Commit:
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18941344493
Forwarded from Libreware
How to run #ADB and #fastboot in #Termux without root to unlock #bootloader, run ADB commands, remove #bloatware, flash ROM, or even root another #Android
https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/:
1. It supports debloating of various manufacturers and mobile carriers such as LG, Samsung, Xiaomi, Huawei, Oppo, Realme, Vivo, ZTE, OnePlus, Nokia, Sony, Asus, Google, Fairphone, Motorola, Tecno, Unihertz.
2. Full access to the app’s private storage — including databases, tokens, cached credentials, config files, or even offline user data.
3. Another common issue in AndroidManifest.xml is this flag: When enabled (which it is by default unless explicitly disabled), Android allows the app’s private data to be backed up via ADB — again, even on non-rooted devices.
Android
https://github.com/nohajc/termux-adb
Android debloater for pc and debloat lists
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
#debloat
https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/:
1. It supports debloating of various manufacturers and mobile carriers such as LG, Samsung, Xiaomi, Huawei, Oppo, Realme, Vivo, ZTE, OnePlus, Nokia, Sony, Asus, Google, Fairphone, Motorola, Tecno, Unihertz.
2. Full access to the app’s private storage — including databases, tokens, cached credentials, config files, or even offline user data.
3. Another common issue in AndroidManifest.xml is this flag: When enabled (which it is by default unless explicitly disabled), Android allows the app’s private data to be backed up via ADB — again, even on non-rooted devices.
Android
https://github.com/nohajc/termux-adb
Android debloater for pc and debloat lists
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
#debloat
Mobile Hacker
How to Run ADB and Fastboot on a Non-Rooted Android Smartphone Using Termux
Thanks to Termux and the clever termux-adb project, you can run ADB and Fastboot directly from your phone — no computer needed. This guide breaks down how to install it, how it works, and practical use cases.
Forwarded from Libreware
Universal Android Debloater Next Generation
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
This is a detached fork of the UAD project, which aims to improve privacy and battery performance by removing unnecessary and obscure system apps. This can also contribute to improving security by reducing (but not eliminating) the attack surface. Read the wiki for more details on getting started. Whilst UAD-ng can remove system apps, it cannot detect or remove potentially malicious system services or drivers baked into the firmware of your device by various vendors; some vendor-specific apps are only UI front-ends to vendor-provided system services, and as such disabling/uninstalling those apps will not stop a service from running. Additional information can be found in package descriptions inside the Universal Android Debloater Next Generation application.
#Android #debloat #UADNG
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
This is a detached fork of the UAD project, which aims to improve privacy and battery performance by removing unnecessary and obscure system apps. This can also contribute to improving security by reducing (but not eliminating) the attack surface. Read the wiki for more details on getting started. Whilst UAD-ng can remove system apps, it cannot detect or remove potentially malicious system services or drivers baked into the firmware of your device by various vendors; some vendor-specific apps are only UI front-ends to vendor-provided system services, and as such disabling/uninstalling those apps will not stop a service from running. Additional information can be found in package descriptions inside the Universal Android Debloater Next Generation application.
#Android #debloat #UADNG
GitHub
GitHub - Universal-Debloater-Alliance/universal-android-debloater-next-generation: Cross-platform GUI written in Rust using ADB…
Cross-platform GUI written in Rust using ADB to debloat non-rooted Android devices. Improve your privacy, the security and battery life of your device. - Universal-Debloater-Alliance/universal-andr...
Forwarded from Android Security & Malware
[beginners] Deep dive into Android Pentesting
Covered everything from static & dynamic analysis, Frida, Drozer, SSL pinning bypass, deep links, broadcast receivers, and more
If you're into mobile security, this one's packed with real-world scenarios & tools
https://coal-memory-97b.notion.site/Android-Pentest-1f6923af30cc80bdafa4f3c581f4c5f8
Covered everything from static & dynamic analysis, Frida, Drozer, SSL pinning bypass, deep links, broadcast receivers, and more
If you're into mobile security, this one's packed with real-world scenarios & tools
https://coal-memory-97b.notion.site/Android-Pentest-1f6923af30cc80bdafa4f3c581f4c5f8
Works fine 😉
5.15.195-android13-lts-Normal-AnyKernel3
Wild_KSU_v0.0.179-spoofed_13974-release
5.15.195-android13-lts-Normal-AnyKernel3
Wild_KSU_v0.0.179-spoofed_13974-release
Forwarded from Bones' Tech Garage
This is not an accident. Google is just being anti-competitive.
https://news.itsfoss.com/google-safe-browsing-flags-immich/
https://news.itsfoss.com/google-safe-browsing-flags-immich/
It's FOSS
Safe Browsing Flags Open Source Photo App Immich Web URLs as Dangerous
Automated security system mistook legit Immich instances for phishing, which seems to be coming from misconfigured HTTPS setting.
Forwarded from The Hacker News
🚨 A single line of JavaScript can crash any Chromium browser.
Researcher Jose Pino calls it Brash — it abuses how document.title handles rapid updates.
24 million title changes per second = instant crash.
Still unpatched. Details ↓ https://thehackernews.com/2025/10/new-brash-exploit-crashes-chromium.html
Researcher Jose Pino calls it Brash — it abuses how document.title handles rapid updates.
24 million title changes per second = instant crash.
Still unpatched. Details ↓ https://thehackernews.com/2025/10/new-brash-exploit-crashes-chromium.html
Forwarded from It's FOSS
Trick out your Linux desktop with a spooky Hyprland makeover this Halloween! 👻🎃
https://itsfoss.com/hyprland-halloween-customization/
https://itsfoss.com/hyprland-halloween-customization/
It's FOSS
Here's How You Can Customize Linux Desktop for Halloween [Dot Files Included]
Forget pumpkin carving. This year, I carved out a haunted Hyprland setup straight from the underworld of Arch Linux 👻
Forwarded from The Conscious Resistance
NEW from Neil Radimaker — California’s Mileage-Based Road Charge: What It Is, How It Would Work, and Why Privacy Risks Increase
As I’ve been investigating California’s mileage-based road charge, it’s clear this isn’t just a policy about road funding. It’s the quiet rollout of a system built to track, record, and bill movement itself. The state says it’s about fairness and modernization, but the deeper I look, the more it resembles a permanent surveillance and revenue network disguised as transportation reform. What’s being tested today through Caltrans and the State Transportation Agency is the blueprint for total mileage monitoring tied to personal identity.
READ:
https://theconsciousresistance.com/californias-mileage-based-road-charge-what-it-is-how-it-would-work-and-why-privacy-risks-increase/
⏩ @TheConsciousResistance
As I’ve been investigating California’s mileage-based road charge, it’s clear this isn’t just a policy about road funding. It’s the quiet rollout of a system built to track, record, and bill movement itself. The state says it’s about fairness and modernization, but the deeper I look, the more it resembles a permanent surveillance and revenue network disguised as transportation reform. What’s being tested today through Caltrans and the State Transportation Agency is the blueprint for total mileage monitoring tied to personal identity.
READ:
https://theconsciousresistance.com/californias-mileage-based-road-charge-what-it-is-how-it-would-work-and-why-privacy-risks-increase/
⏩ @TheConsciousResistance
The Conscious Resistance Network
California’s Mileage-Based Road Charge: What It Is, How It Would Work, and Why Privacy Risks Increase - The Conscious Resistance…
Text to Audio Player As California advances its mileage based road charge, the program reveals itself as more than a funding mechanism. It establishes a system designed to record, verify, and bill movement itself. While state agencies frame the effort as…
Forwarded from The Hacker News
⚠️ “Patch everything” is dead.
At the BAS Summit, CISOs said it straight — not every vuln matters, only the exploitable ones do.
Breach simulation shows where you bleed, not where scanners scream.
Proof beats panic. Read how BAS powers real defense → https://thehackernews.com/2025/10/the-death-of-security-checkbox-bas-is.html
At the BAS Summit, CISOs said it straight — not every vuln matters, only the exploitable ones do.
Breach simulation shows where you bleed, not where scanners scream.
Proof beats panic. Read how BAS powers real defense → https://thehackernews.com/2025/10/the-death-of-security-checkbox-bas-is.html
Forwarded from The Hacker News
🔥 A tool built for defenders is now arming attackers.
AdaptixC2 — an open-source C2 in Golang — was made for red teams.
Now, Russian ransomware gangs use it in fake Microsoft Teams help-desk scams.
Details ↓ https://thehackernews.com/2025/10/russian-ransomware-gangs-weaponize-open.html
AdaptixC2 — an open-source C2 in Golang — was made for red teams.
Now, Russian ransomware gangs use it in fake Microsoft Teams help-desk scams.
Details ↓ https://thehackernews.com/2025/10/russian-ransomware-gangs-weaponize-open.html