Hello,
I don't feel good. I have Influenza Type A and I am expelling mystery goo from my lungs. However, I have gotten on my computer to share I have made some updates to malware site.
Because opensourcemalware-dot-com (which apparently is new and cool right now) shares SHA256s, but they're not downloadable, I have begun downloading them and placing them on malware site.
I planned on adding more today, but my body is weak and the mystery goo from my lungs hurts
https://vx-underground.org/Samples/OpenSourceMalware
I don't feel good. I have Influenza Type A and I am expelling mystery goo from my lungs. However, I have gotten on my computer to share I have made some updates to malware site.
Because opensourcemalware-dot-com (which apparently is new and cool right now) shares SHA256s, but they're not downloadable, I have begun downloading them and placing them on malware site.
I planned on adding more today, but my body is weak and the mystery goo from my lungs hurts
https://vx-underground.org/Samples/OpenSourceMalware
β€77π’36π₯°1
vx-underground
Hello, I don't feel good. I have Influenza Type A and I am expelling mystery goo from my lungs. However, I have gotten on my computer to share I have made some updates to malware site. Because opensourcemalware-dot-com (which apparently is new and cool rightβ¦
This media is not supported in your browser
VIEW IN TELEGRAM
Unrelated:
π60π€£20π₯°11π₯6β€5β€βπ₯1π±1
Hello,
This social media profile is now the largest cybersecurity-related profile on Xitter. It has passed SwiftOnSecurity.
What does this mean? Well, as the top influencer I am carrying the weight of the world on my shoulders. This is a very serious role. I'm basically a superhero.
First, I will begin pushing my new cybersecurity course. It will be somewhere between $200 - $500. It will not be formally recognized by any institution or employer. Additionally, it will be poorly developed and half-assed. I will lie and say it will help you get a job (it won't).
Second, I will begin pushing cryptocurrency coins which I will say are going to solve some opaque problem in cybersecurity. I'll make something up, like, "this coin will prevent DHCP DNS cluster fraud". It won't make sense. When someone questions it I will immediately deflect blame or call them bad names.
Third, I will travel to every major cybersecurity conference. Each talk I give will not be technical. My talks will primarily revolve around my experiences, and wisdom, or something. I will pretend to be an old sage filled with knowledge, things you could literally never understand. In actuality, I can barely send an e-mail.
Thank you for the love and support. I look forward to rug pulling all of you.
This social media profile is now the largest cybersecurity-related profile on Xitter. It has passed SwiftOnSecurity.
What does this mean? Well, as the top influencer I am carrying the weight of the world on my shoulders. This is a very serious role. I'm basically a superhero.
First, I will begin pushing my new cybersecurity course. It will be somewhere between $200 - $500. It will not be formally recognized by any institution or employer. Additionally, it will be poorly developed and half-assed. I will lie and say it will help you get a job (it won't).
Second, I will begin pushing cryptocurrency coins which I will say are going to solve some opaque problem in cybersecurity. I'll make something up, like, "this coin will prevent DHCP DNS cluster fraud". It won't make sense. When someone questions it I will immediately deflect blame or call them bad names.
Third, I will travel to every major cybersecurity conference. Each talk I give will not be technical. My talks will primarily revolve around my experiences, and wisdom, or something. I will pretend to be an old sage filled with knowledge, things you could literally never understand. In actuality, I can barely send an e-mail.
Thank you for the love and support. I look forward to rug pulling all of you.
β€195π€£82π16π10π€―6π€©3π3π€3π₯°2π2π1
vx-underground
> npm package > "optimizer-cpu" > look inside > base64 encoded string > decode base64 > deploys XMRig miner to pc > doesnt optimize cpu
smh only 2 installs before npm nuked it. i dont wanna sound like a hater, but your CPU optimizer SUCKS (it just installs a crypto miner)
https://gist.github.com/vxunderground/25ecfb5dea631d2a79b81d83e79405db
https://gist.github.com/vxunderground/25ecfb5dea631d2a79b81d83e79405db
Gist
after and before
GitHub Gist: instantly share code, notes, and snippets.
π₯°49π€£19β€11π₯6π4
Big news on the internet today as the United States Department of Justice wildly underestimated computer nerds
Mahmoud Al-Qudsi (mqudsi), the founder of NeoSmart Technologies, is a nerd who specializes in computer forensics. His entire career (dating back over 2 decades) has been focused almost exclusively on data forensics, data restoration, and data backups.
Because Mr. Al-Qudsi is a nerd who unironically enjoys painstakingly reviewing computer forensics at the byte level, something almost no one else on the planet enjoys, Mr. Al-Qudsi began exploring the recently released Epstein files.
Today he released a write-up explaining the problems with the Epstein redactions, errors they left in the PDF files, ... and all sorts of other artifacts the Department of Justice accidentally left behind. By leveraging these different digital artifacts, it is possible for experts such as Al-Qudsi to reconstruct the files without their redactions.
See subsequent post for his write-up
tl;dr he's reverse engineering and reconstructing epstein files. but hard and will take lots of work
pic: me trying to understand computer forensics based on fonts used
Mahmoud Al-Qudsi (mqudsi), the founder of NeoSmart Technologies, is a nerd who specializes in computer forensics. His entire career (dating back over 2 decades) has been focused almost exclusively on data forensics, data restoration, and data backups.
Because Mr. Al-Qudsi is a nerd who unironically enjoys painstakingly reviewing computer forensics at the byte level, something almost no one else on the planet enjoys, Mr. Al-Qudsi began exploring the recently released Epstein files.
Today he released a write-up explaining the problems with the Epstein redactions, errors they left in the PDF files, ... and all sorts of other artifacts the Department of Justice accidentally left behind. By leveraging these different digital artifacts, it is possible for experts such as Al-Qudsi to reconstruct the files without their redactions.
See subsequent post for his write-up
tl;dr he's reverse engineering and reconstructing epstein files. but hard and will take lots of work
pic: me trying to understand computer forensics based on fonts used
π₯°83π₯25β€10π«‘6π1
vx-underground
Big news on the internet today as the United States Department of Justice wildly underestimated computer nerds Mahmoud Al-Qudsi (mqudsi), the founder of NeoSmart Technologies, is a nerd who specializes in computer forensics. His entire career (dating backβ¦
The NeoSmart Files
Recreating uncensored Epstein PDFs from raw encoded attachments
There have been a lot of complaints about both the competency and the logic behind the latest Epstein archive release by the DoJ: from censoring the names of co-conspirators to censoring pictures oβ¦
β€59π₯°15π€©3
The cool thing about this social media profile growing in size is that it now frequently escapes the core demographic. This has resulted in very silly shenanigans.
As many of my core audience knows, I frequently refer to my colleagues and peers as "nerds". I use it as a term of endearment.
Non-core audience perceives this as an insult. Furthermore, they do not seem to understand this social media profile primarily revolves around cybersecurity with an emphasis on malware. Hence, many tongue-in-cheeks jokes and sentences are misconstrued and misunderstood.
Things I've seen people call me:
- Jewish (I'm not Jewish, I'm not Israeli, ???)
- A boomer
- Homosexual slurs
- Intellectually Challenged
- A boot licker (???)
tl;dr log into xitter, get called retard piece of shit jew homo bootlicking scum because i called people nerds
As many of my core audience knows, I frequently refer to my colleagues and peers as "nerds". I use it as a term of endearment.
Non-core audience perceives this as an insult. Furthermore, they do not seem to understand this social media profile primarily revolves around cybersecurity with an emphasis on malware. Hence, many tongue-in-cheeks jokes and sentences are misconstrued and misunderstood.
Things I've seen people call me:
- Jewish (I'm not Jewish, I'm not Israeli, ???)
- A boomer
- Homosexual slurs
- Intellectually Challenged
- A boot licker (???)
tl;dr log into xitter, get called retard piece of shit jew homo bootlicking scum because i called people nerds
π€£84π₯°54π€13β€6β€βπ₯2π―2π1π«‘1
vx-underground
The cool thing about this social media profile growing in size is that it now frequently escapes the core demographic. This has resulted in very silly shenanigans. As many of my core audience knows, I frequently refer to my colleagues and peers as "nerds".β¦
I'm not mad, or sad, or whatever. I am however profoundly confused.
Imagine changing a diaper, checking the Xitter, logging in, and you see a bunch of strangers calling you names and mean stuff
mfw
Imagine changing a diaper, checking the Xitter, logging in, and you see a bunch of strangers calling you names and mean stuff
mfw
π₯°57π€£19π7β€6π4π―4π€1π€1
Conspiracy theorists going full theorist today. In the Department of Justice Epstein email releases it was discovered he played Fortnite.
Coincidentally, his Epic account was active after his death.
Coincidentally, his Epic account was active after his death.
π€£99π₯°10π6π±5π’3β€2
vx-underground
Conspiracy theorists going full theorist today. In the Department of Justice Epstein email releases it was discovered he played Fortnite. Coincidentally, his Epic account was active after his death.
Is Jeffrey Epstein actually alive? Is he a pro-gamer? Why hasn't he spent more money on V-bucks?
Find out next time on Dragon Ball Z
Find out next time on Dragon Ball Z
π€£77β€16π₯°2
Non-nerds are asking how Mr. Al-Qudsi (mqudsi) is working to reconstruct redacted Epstein data. Here is a high-level summary that isn't as nerdy schizo
Mega tl;dr
> Send email
> Add attachment
> Emails no understand files
> Email turn files in text (Base64 encoding*)
> Image 1 is email turning attachment into text
> Send email
> Someone receive email
> Email reads add-on text
> "oh thats an attachment"
> Transforms into attachment you can see (Base64 decoding*)
> DoJ releases Epstein emails
> Didn't censor attachment stuff
> hehe big mistake, we can recover this
> Boom, all attachments "censored" now uncensored
> All hidden attachments now public
> Go to work
> Problems arise
> DoJ printed emails (???)
> Scanned printed emails back (???)
> Try to rebuild from email stuff
> Fails
> wtf.mp4
> Look inside
> DoJ printed as "Courier New" font
> L and 1 look the same
> Try to reconstruct
> Fails
> Computer can't figure difference between L and 1
> (Look at image 2)
> Can you even tell the difference???
To manually reconstruct all attachments from Epstein emails data forensic experts must find a way to programmatically determine which characters are L's and which are 1's. This is only a problem because the DoJ printed it as Courier New.
Proposed solution right now is bruteforce. Try every possible combination, swapping L's and 1's, check email thing, does it work? No? Repeat. However, this could take a long time.
Another solution is taking known email encoded thingies that work and compare it to Epstein files. Try to identify patterns and reconstruct it using machine learning.
Mega tl;dr
> Send email
> Add attachment
> Emails no understand files
> Email turn files in text (Base64 encoding*)
> Image 1 is email turning attachment into text
> Send email
> Someone receive email
> Email reads add-on text
> "oh thats an attachment"
> Transforms into attachment you can see (Base64 decoding*)
> DoJ releases Epstein emails
> Didn't censor attachment stuff
> hehe big mistake, we can recover this
> Boom, all attachments "censored" now uncensored
> All hidden attachments now public
> Go to work
> Problems arise
> DoJ printed emails (???)
> Scanned printed emails back (???)
> Try to rebuild from email stuff
> Fails
> wtf.mp4
> Look inside
> DoJ printed as "Courier New" font
> L and 1 look the same
> Try to reconstruct
> Fails
> Computer can't figure difference between L and 1
> (Look at image 2)
> Can you even tell the difference???
To manually reconstruct all attachments from Epstein emails data forensic experts must find a way to programmatically determine which characters are L's and which are 1's. This is only a problem because the DoJ printed it as Courier New.
Proposed solution right now is bruteforce. Try every possible combination, swapping L's and 1's, check email thing, does it work? No? Repeat. However, this could take a long time.
Another solution is taking known email encoded thingies that work and compare it to Epstein files. Try to identify patterns and reconstruct it using machine learning.
π₯°66β€20π€―16π’4π2π2π€1
vx-underground
Non-nerds are asking how Mr. Al-Qudsi (mqudsi) is working to reconstruct redacted Epstein data. Here is a high-level summary that isn't as nerdy schizo Mega tl;dr > Send email > Add attachment > Emails no understand files > Email turn files in text (Base64β¦
Update: Random nerd (literally, they didn't leave a name or anything, just a random message to Al-Qudsi) said he magnified the text, enhanced, zoomed in (unironically some CSI Miami bullshit), and noticed slight differences in the characters virtually invisible to the human eye, but still present in the documents.
He was able to increase the darkness and make the L's and 1's more pronounced to possibly solve the problem. However, this would require manually fixing the documents.
He was able to increase the darkness and make the L's and 1's more pronounced to possibly solve the problem. However, this would require manually fixing the documents.
β€72π₯°17π₯8π€©6β€βπ₯4
Now that there is a tsunami of nerds trying to unredact Epstein file attachments, how long will it take for the weaponized autism to "crack the code" (solve the L = 1 problem), and release unredacted Epstein documents?
Anonymous Poll
33%
Less than 24 hours
39%
1 - 3 days
21%
A week or more
7%
Months
β€33π₯°10
Pam Bondi and Kash Patel when they realize the Epstein documents they had the interns censor weren't censored correctly (again for the 5th time) and now nerds are actively reverse engineering and decoding e-mail attachments to find redacted emails and redacted attachments
π₯°100π€£59π11β€6π―6π1