From the Google Dork-able ChatGPT conversations, someone noted the discovery of a person who believes they're in an intimate and/or sexual relationship with ChatGPT.
It is a very long read. It isn't someone being ironic. It is one of the strangest thing I've ever read.
It is a very long read. It isn't someone being ironic. It is one of the strangest thing I've ever read.
π€£66π€8β€3π’2π1π±1
vx-underground
From the Google Dork-able ChatGPT conversations, someone noted the discovery of a person who believes they're in an intimate and/or sexual relationship with ChatGPT. It is a very long read. It isn't someone being ironic. It is one of the strangest thing I'veβ¦
Yeah, I'm killing myself tonight.
π€£82π«‘10π7β€4π₯°3π€―3π2π’1π1
vx-underground
Yeah, I'm killing myself tonight.
Burn all AI to the ground. This man's brain is COOKED
π€£63β€6π6π€―5π’1π«‘1
vx-underground
Now being referred to as "The Computer Virus Guy" Milady, might I tempt thee with a most exquisite computer virus?
Perhaps a charming ransomware, or perchance a distinguished information stealer? Hmmmm?
β€βπ₯51π₯°13π€£8β€1π1π’1
Everyone please pray for our friend Franklin. His Father got diagnosed with Sugma. It's fatal.
π’75π19π€£6β€βπ₯5β€1π₯1
Something interesting happened.
The United Kingdom Ministry of Justice (UK MoJ) e-mailed UNC6040 (ShinyHunters and/or UNC3944), the individual(s) believed to be responsible for the compromise(s) of Salesforce, United Kingdom Legal Aid Agency, PowerSchool, Oracle Cloud, and Snowflake.
The Ministry of Justice discovered the disposable e-mail used by the Threat Actor(s) and subsequently e-mailed them a court summons for the crimes committed.
We have a copy of the court summons.
The United Kingdom Ministry of Justice (UK MoJ) e-mailed UNC6040 (ShinyHunters and/or UNC3944), the individual(s) believed to be responsible for the compromise(s) of Salesforce, United Kingdom Legal Aid Agency, PowerSchool, Oracle Cloud, and Snowflake.
The Ministry of Justice discovered the disposable e-mail used by the Threat Actor(s) and subsequently e-mailed them a court summons for the crimes committed.
We have a copy of the court summons.
π₯33π€£30π6β€4π’1π€1
vx-underground
Something interesting happened. The United Kingdom Ministry of Justice (UK MoJ) e-mailed UNC6040 (ShinyHunters and/or UNC3944), the individual(s) believed to be responsible for the compromise(s) of Salesforce, United Kingdom Legal Aid Agency, PowerSchoolβ¦
As silly as this reads, I don't personally believe the Ministry of Justice actually believed the individuals responsible for these attacks would appear before the courts.
It seems like a formality. If in the event someone is apprehended in the future, the prosecution can state they refused to appear before the courts hence they're fugitives, or fugitive-like.
It seems like a formality. If in the event someone is apprehended in the future, the prosecution can state they refused to appear before the courts hence they're fugitives, or fugitive-like.
β€32π11π5π―5π₯1π₯°1π€1π€1
As is tradition I will not be personally attending DEFCON this year.
I will be attending DEFCON as my first ever computer conference in 2027. I'm just waiting for the statute of limitations for wire fraud to hit.
Hahaha just kidding, that's crazy talk
I will be attending DEFCON as my first ever computer conference in 2027. I'm just waiting for the statute of limitations for wire fraud to hit.
Hahaha just kidding, that's crazy talk
π€£53π€15π«‘8β€5π₯1π1π±1π’1
vx-underground
As is tradition I will not be personally attending DEFCON this year. I will be attending DEFCON as my first ever computer conference in 2027. I'm just waiting for the statute of limitations for wire fraud to hit. Hahaha just kidding, that's crazy talk
But no seriously, 2027 I'll probably be there.
π₯°40β€12π₯10π5π’2
vx-underground
h313n_0f_t0r while be at DEFCON representing us. She will have several different limited edition vx-underground stickers. Two are holographic. One is glow-in-the-dark. If you see her say "Hello" and grab a sticker.
Oh, and do not touch her.
You do not need to touch her to get her attention. You do not need to suddenly grab her to get her attention. You do not need to touch her during any point of the conversation.
Thanks
You do not need to touch her to get her attention. You do not need to suddenly grab her to get her attention. You do not need to touch her during any point of the conversation.
Thanks
π76π«‘32π―12π€£11β€βπ₯4π’4π€4β€3π€3π±3π€―2
"Tim Je" made a website that uses AI to programmatically generate fake IDs of United Kingdom politicians. This was done to mock the United Kingdom Online Safety Act
https://use-their-id.com/
https://use-their-id.com/
π103π₯23β€18π€£14π―6π«‘5π4π1
All of our artwork is now available for download. You can use this to produce merch, stickers, or whatever else you'd like.
You're free to do whatever you want with it. However, if you make a profit, give us some money. If you don't... you're mean.
https://vx-underground.org/Art
You're free to do whatever you want with it. However, if you make a profit, give us some money. If you don't... you're mean.
https://vx-underground.org/Art
β€67β€βπ₯24π₯11π8π’1
I've decided I'm going to name my Red Team tool "Meow Meow Kitty Cat Meow Meow Loader".
It is a small tool suite where someone can programmatically embed a payload (.exe, .sys, .dll, etc) into a picture (currently only .BMP images).
It was 3 different binaries present:
- Inserter: CLI for embedding payloads into a target BMP file.
- Remover: CLI tool for testing if the embed process worked correctly. Extracts embedded payload into target destination. Does nothing else
- Meow Meow Kitty Cat Meow Meow Loader: Unnecessarily over-complicated and evasive binary which, only using indirect-syscalls, programmatically extracts the payload from a target .BMP. Extracted payload is executed in-memory, embedded payload never touches the disk
Only writing this because I was bored and wanting to do something with steganography. I may in the future expand to handle .TIFF, .PNG, or over-complicate it more and use Windows COM and/or GDI+ to handle the steganography process. I may also explore doing it with audio or video.
It is a small tool suite where someone can programmatically embed a payload (.exe, .sys, .dll, etc) into a picture (currently only .BMP images).
It was 3 different binaries present:
- Inserter: CLI for embedding payloads into a target BMP file.
- Remover: CLI tool for testing if the embed process worked correctly. Extracts embedded payload into target destination. Does nothing else
- Meow Meow Kitty Cat Meow Meow Loader: Unnecessarily over-complicated and evasive binary which, only using indirect-syscalls, programmatically extracts the payload from a target .BMP. Extracted payload is executed in-memory, embedded payload never touches the disk
Only writing this because I was bored and wanting to do something with steganography. I may in the future expand to handle .TIFF, .PNG, or over-complicate it more and use Windows COM and/or GDI+ to handle the steganography process. I may also explore doing it with audio or video.
π₯°71β€16π11β€βπ₯4π€4π₯3π2π€£2π€2π’1