CareWeDoNot Profile Banner
WDNC Profile
WDNC

@CareWeDoNot

Followers
211
Following
8K
Media
898
Statuses
4K

Freedom. Pattern Recognition. Cyber Security. Music Theory. Hardware and Software hacking. Magic The Gathering nerd.

United States
Joined May 2016
Don't wanna be here? Send us removal request.
@CareWeDoNot
WDNC
4 months
POC - How to hide Windows reverse shell inside a .png file. This method utilizes a tool I built to easily morph the executable into over 20 different possible extensions. Even if it looks legit - don't be so quick to click.
2
1
13
@CareWeDoNot
WDNC
1 day
Summer 2009 - little bit of caffeine leaking through the front page but otherwise fine.
Tweet media one
0
0
0
@CareWeDoNot
WDNC
2 days
RT @DarkWebInformer: "WiFi Pentesting Just Became Easy / Angry Oxide". Video Credit:
0
239
0
@CareWeDoNot
WDNC
3 days
When my parents complained about traffic.
Tweet media one
0
0
0
@CareWeDoNot
WDNC
4 days
What do we call this behavior?
Tweet media one
0
0
0
@CareWeDoNot
WDNC
4 days
RT @Pirat_Nation: Full sites seized by the FBI:.>nsw2u.>nswd.>game-2u.>bigngame.>ps4pkg com.>ps4pkg net.>mgnetu
Tweet media one
0
695
0
@CareWeDoNot
WDNC
5 days
RT @pdiscoveryio: How to get subdomains, validate DNS, and probe with httpx - all in JSON!. This one-liner is a great start to your automat….
0
31
0
@CareWeDoNot
WDNC
5 days
Was playing music and thinking about how machines have taken over everything. I guess when the lights started to flicker was the cue to stop.
0
0
1
@CareWeDoNot
WDNC
6 days
They are using a PHP function that checks whether the server supports curl. If not, it falls back to file_get_contents. This function then fetches data from a hardcoded remote URL, storing it in a variable ($t) which is used to trigger a redirect with header("Location: . "). In.
0
0
1
@CareWeDoNot
WDNC
6 days
Tweet media one
0
0
1
@CareWeDoNot
WDNC
6 days
Example of the r2048 function:
Tweet media one
0
0
1
@CareWeDoNot
WDNC
6 days
A look at the vulnerable piece of code:
Tweet media one
0
0
1
@CareWeDoNot
WDNC
6 days
WordPress - Evidence found of attackers injecting malicious code directly into theme files—like footer.php—to redirect your visitors to unwanted sites. They use a PHP function (r2048) to fetch a remote URL, then issue a 302 redirect without touching the dashboard—you won’t
Tweet media one
4
0
1
@CareWeDoNot
WDNC
7 days
go further:.curl -s ?q\=\*.targetc0rp.com\&output\=json | jq -r '.[].name_value' | grep -Po '(\w+\.\w+\.\w+)$' | sort -u.
0
0
2
@CareWeDoNot
WDNC
7 days
Find and hunt subdomains like a boss:
Tweet media one
1
0
1
@CareWeDoNot
WDNC
7 days
Did they ever threaten to kick anyone off of welfare for not taking the vaccine?.
0
0
1
@CareWeDoNot
WDNC
14 days
🚨 Apache issues critical RCE patches for Tomcat & Camel 🚨. In March 2025, Apache Tomcat versions 9.0.0.M1–9.0.98, 10.1.0.M1–10.1.34 and 11.0.0.M1–11.0.2 were found vulnerable to CVE‑2025‑24813, allowing remote code execution via partial PUT requests with Content‑Range headers
Tweet media one
0
0
2
@CareWeDoNot
WDNC
15 days
🧪 Malware Surge via LNK Files according to Palo Alto. LNK-based malware is booming baby. According to source data malicious Windows shortcut files jumped from 21K in 2023 to 68K+ in 2024. Hackers are abusing .lnk files to execute payloads, scripts, and exploits while
Tweet media one
0
0
1
@CareWeDoNot
WDNC
16 days
🚨 New Lab52 alert: Russian-origin Snake Keylogger is exploiting trusted Java tools in a geopolitical-themed phishing campaign 🐍. 📧 Spear-phishing emails tout oil deals, using a weaponized jsadebugd.exe DLL-sideload to inject Snake into InstallUtil.exe.🎯 Targets span
Tweet media one
0
0
3
@CareWeDoNot
WDNC
16 days
🚨 New DFIR report: RDP password spraying is back — and it's working. 🛠️ Threat actors used password spray attacks to gain access via exposed RDP, followed by hands-on-keyboard activity and eventual RansomHub deployment. 🔑 Key takeaways:.• Weak RDP creds = open door.•
Tweet media one
0
0
3
@CareWeDoNot
WDNC
20 days
🚨 New Threat Evolution Alert. 🎭 "GiftedCrook" malware has leveled up — what started as a basic browser stealer is now a full-blown data exfiltration platform. 🧠 The devs have pivoted hard:.• Targeting cloud drives, messaging apps, and crypto wallets.• Designed to evade.
0
0
1