DARKNAVY (@darknavyorg) 's Twitter Profile
DARKNAVY

@darknavyorg

Cybersecurity enthusiasts from DARKNAVY. Achieve, Analyze, Attack *Oops.

ID: 1719718637974745088

linkhttps://www.darknavy.org/ calendar_today01-11-2023 14:12:24

38 Tweet

1,1K Followers

44 Following

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

Will AI become the next-generation bug hunters? Here's the 3rd article of our Annual Security Report: darknavy.org/darknavy_insigโ€ฆ

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

Will this be the last RCE on Windows? We researched the MadLicense vulnerability and interviewed the author๐Ÿค . Please take a look at our and the author's insight into Windows defense. Here's the 4th article of our Annual Security Report: darknavy.org/darknavy_insigโ€ฆ

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

We share massive amounts of personal data with AI every day. Are these privacy data really secure enough? Here's the 5th article of our Annual Security Report: darknavy.org/darknavy_insigโ€ฆ

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

We've all heard how the XZ backdoor was busted by a 500ms lagโ€”but do you know what really caused that slowdown? (Spoiler: It's not the cryptography) Here's the 6th article of our Annual Security Report: darknavy.org/darknavy_insigโ€ฆ

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

Is the memory corruption vulnerability approaching its twilight? Here's the 7th article of our Annual Security Report: darknavy.org/darknavy_insigโ€ฆ

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

Is antivirus software making us more secure, or vice versa? Here's the 8th article of our Annual Security Report: darknavy.org/darknavy_insigโ€ฆ

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

Vendors still hold absolute dominance in vulnerability disclosure, and there is still a long way to go in establishing a benign and efficient vulnerability disclosure mechanism. Here's the 9th article of our Annual Security Report: darknavy.org/darknavy_insigโ€ฆ

deepsec.cc (@deepsec_cc) 's Twitter Profile Photo

[Official Announcement]: deepsec.cc 2025 IS COMING!!! This is a community-driven, non-profit information security closed-door symposium, where technology speaks loudest. ๐ŸŒ deepsec.cc ๐Ÿ“… June 16, 2025 ๐Ÿ“ Shanghai, China ๐Ÿ“ง [email protected]

[Official Announcement]: deepsec.cc 2025 IS COMING!!!

This is a community-driven, non-profit information security closed-door symposium, where technology speaks loudest.

๐ŸŒ deepsec.cc

๐Ÿ“… June 16, 2025

๐Ÿ“ Shanghai, China

๐Ÿ“ง x@deepsec.cc
DARKNAVY (@darknavyorg) 's Twitter Profile Photo

Reproducing the Bybit attack: you don't need a perfect attack to steal $1.5 billion. darknavy.org/darknavy_insigโ€ฆ

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

We recently had some fun with the Starlink User Terminal ๐Ÿ“ก Check out our first blog on playing with the REV3 hardware and stay tuned for further reports! ๐Ÿ˜‰ darknavy.org/blog/a_first_gโ€ฆ

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

Curious about how to unleash your robot pet๐Ÿค–? Dive into our article about the jailbroken Unitree robot dog! darknavy.org/darknavy_insigโ€ฆ

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

Ever wondered how secure your crypto hardware wallet really is? In our latest blog, we dive deep into hardware wallet attack surfaces โ€” and yes, we've already compromised a popular model on the market. Details inside: darknavy.org/blog/if_the_peโ€ฆ

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

Are you struggling to find a reliable decompiler for HarmonyOS NEXT applications? Our latest decompiler for .abc files: .abcD, is now available for trial!๐Ÿฅท abcd.darknavy.org

deepsec.cc (@deepsec_cc) 's Twitter Profile Photo

#deepsec Session "Exploiting the Next State of Communication with Zero-Interaction" by K.i.V.A. inspects [redacted] protocol and demonstrate how authentication bypass can be achieved without user interaction. More at deepsec.cc

deepsec.cc (@deepsec_cc) 's Twitter Profile Photo

#deepsec Two talks from DARKNAVY: "A Security Perspective on IM Attack Surfaces" reveals flaws enabling stealthy backdoors in WeChat. "Argusee: AI-Powered Multi-Agent System for Next-Gen Vulnerability Discovery" uses AI to uncover exploitable 0-days. deepsec.cc

GEEKCON (@geekcontop) 's Twitter Profile Photo

๐Ÿ”“ GEEKCON 2025 CFP: CALL FOR PWNERS ๐ŸŒ Dubai | Shanghai | Oct. 2025 Submit by Aug 15 ๐Ÿ‘‰geekcon.top - Crack Web3 vaults live ๐Ÿ’ธ - Hijack drones & robots ๐Ÿค– - Rewrite cybersecurity rules ๐Ÿ“ก - Code security into reality ๐Ÿ’ป Unlock cybersecurity insights and defense

๐Ÿ”“ GEEKCON 2025 CFP: CALL FOR PWNERS
๐ŸŒ Dubai | Shanghai | Oct. 2025
Submit by Aug 15 ๐Ÿ‘‰geekcon.top

- Crack Web3 vaults live ๐Ÿ’ธ
- Hijack drones & robots ๐Ÿค–
- Rewrite cybersecurity rules ๐Ÿ“ก
- Code security into reality ๐Ÿ’ป

Unlock cybersecurity insights and defense