reverse engineering
3.6K subscribers
87 photos
11 videos
25 files
132 links
◉ A channel for learning and discussing about reverse engineering

◉ We aren't accepting any illegal works, we are here to help, learn and gain new skills
◉ Owner @Mohamed_Abozaid1
◉ Egypt 🇪🇬

Please don't PM ask in discussion group except in necessity
Download Telegram
Claude AI is down

After what we saw from cloudflare at the end of 2025 will Claude be the same 😂
As some people say DaaS (Downtime As A Service)

Be updated on https://status.claude.com/
6😁5👎1
This must be a joke 😂

How to say our app can be a Trojan without saying 😁

Anyway that is why I always advise you not to install anything on your device
I don't have any personal issues with the app manufacture, but I had say my opinion from a security perspective
#stay_safe_stay_secure

@reverseengineer101
9😁2🤣1
Well thank you ❤️
8🫡3
BITNET an AI model can run locally introduced by Microsoft and it can run with limited resources (cpu, ram,...) people say you can run it using your old PC

https://github.com/microsoft/BitNet

Shared by @reverseengineer101
👍74👎1
Chinese hackers have hacked American Telecommunications Companies

In a process called Salt Typhoon, Chinese Hackers has intercepted some calls and compromised millions of metadata records after hacking the American Telecommunications Companies from 2 years before now unnoticed which make it one of the biggest security flaws have occurred.

Experts say it's mostly sponsored by the Chinese Government for spying and politics related reasons

Salt Typhoon Hacks of Telecommunications Companies and Federal Response Implications (American Congress)

@reverseengineer101
11
I have hit one of the dangerous mistakes a Developer can do

As you see here the API is rejecting all the requests without Authorization header but after adding a fake one it returns the data

This vulnerability is classified as BFLA/BOLA API1:2023
(Broken Function/Object Level Authorization) or a Broken Access Control (BAC) issue at all

You can read more about it on OWASP API Top 10

API1:2023 Broken Object Level Authorization

#API_Security

@reverseengineer101
8👍3😢3🤯2😁1
a Threat Actor called "quellostanco" claims that he has stolen a full EgyptAir database.

The database mentioned has 104K records related to HR section including sensitive employees data as he say

@reverseengineer101
6🤯5🤔4🤩1
Ramadan Kaream all ❤️
47👎2
Intigriti Challenge 0226

CTF solved ✓

The write up will be disclosed ASAP the challenge finishes 🏁

@reverseengineer101
8🔥1👏1
SaveAny-Bot 🗃️

Save Any Telegram File to Anywhere 📂 (Alist, Disk, Webdav, S3, Rclone...) . Support restrict saving content and files beyond telegram.

🎯 Features

1- Support documents / videos / photos / stickers… and even Telegraph

2- Bypass "restrict saving content" media

3- Batch download

4- Streaming transfer

5- Multi-user support

6- Auto organize files based on storage rules

7- Watch specified chats and auto-save messages, with filters

8- Transfer files between different storage backends

9- Integrate with yt-dlp to download and save media from 1000+ websites

10- Aria2 integration to download files from URLs/magnets and save to storages

11- Write JS parser plugins to save files from almost any website

12- Storage backends:
- Alist
- S3
- WebDAV
- Local filesystem
- Rclone (via command line)
- Telegram (re-upload to specified chats)


https://github.com/krau/SaveAny-Bot

Shared by @reverseengineer101
🔥54
We are now in the age of Vibe Coding, it's great and everyone in tech feild should use AI in his work and if not he will not equalify his mates in the field or lose his job

But, when it comes to security concerns every developer or organization shall not relay on the AI code generated because it really can cause massive damages or manipulations on their business logic or lose thousands of dollars

The screenshots here is showing a real case found on the wild (my own security researchs) where the developer stored AES Encryption Keys in different places in the code without obfuscation which are responsible to encrypt and decrypt sensitive information like PIN used to unlock users' wallets and other storage that shall be secure by encryption algorithms but unfortunately the keys are exposed

Usually when I see emojis inside a code (like and ) I understand it was written by AI or this code wasn't written by a professional developer so I start my investigations from that point

@reverseengineer101
5🔥4🤣4👍3