Coolapk @Str123
* 自己写的一个免费工具 Qualcomm Debug Tool
* 支持高通设备 9008 自由读写
* 支持发送签名证书
* 支持单独发送消防软管
* 支持 Oplus 设备自由读写
* 无需 rawprogram 支持自动生成 rawprogram
* 自动读取分区表分析
* 可以读取 Oplus super 以及其他无法读取的分区
* 已经在 华为 Mate50 和 真我 GT7 Pro 上面进行测试
QQ:528531990
* A free tool I wrote myself: Qualcomm Debug Tool
* Supports free read and write on Qualcomm 9008 devices
* Supports sending signature certificates
* Supports sending the firehose/loader separately (This often refers to the firehose loader used in EDL/9008 mode)
* Supports free read and write on Oplus (Oppo/OnePlus) devices
* No need for rawprogram, supports automatic generation of rawprogram
* Automatic reading and analysis of the partition table
* Can read Oplus super and other partitions that cannot be read (The 'super' partition is used in dynamic partitioning)
* Has been tested on Huawei Mate50 and Realme GT7 Pro
* 528531990 is the group (number)
* 自己写的一个免费工具 Qualcomm Debug Tool
* 支持高通设备 9008 自由读写
* 支持发送签名证书
* 支持单独发送消防软管
* 支持 Oplus 设备自由读写
* 无需 rawprogram 支持自动生成 rawprogram
* 自动读取分区表分析
* 可以读取 Oplus super 以及其他无法读取的分区
* 已经在 华为 Mate50 和 真我 GT7 Pro 上面进行测试
QQ:528531990
* A free tool I wrote myself: Qualcomm Debug Tool
* Supports free read and write on Qualcomm 9008 devices
* Supports sending signature certificates
* Supports sending the firehose/loader separately (This often refers to the firehose loader used in EDL/9008 mode)
* Supports free read and write on Oplus (Oppo/OnePlus) devices
* No need for rawprogram, supports automatic generation of rawprogram
* Automatic reading and analysis of the partition table
* Can read Oplus super and other partitions that cannot be read (The 'super' partition is used in dynamic partitioning)
* Has been tested on Huawei Mate50 and Realme GT7 Pro
* 528531990 is the group (number)
https://youtu.be/LLg2OUacUKU
How to Unlock Bootloader/Root And Install Custom ROM's Or GSI ROM's in Infinix/Techno MediaTek Devices
How to Unlock Bootloader/Root And Install Custom ROM's Or GSI ROM's in Infinix/Techno MediaTek Devices
YouTube
How To Unlock Bootloader/Root And Install Custom ROMs Or GSI ROMs In Infinix/Tecno Mediatek Devices
Hello ElectricMoves! It sounds like you're about to provide a tutorial on how to unlock the bootloader, root, and install custom ROMs or GSI ROMs on Infinix, Tecno, and MediaTek devices. That's great! If users have any questions or need assistance, they can…
Seems Google did a full crazy and revoked all currently working keybox yesterday. So max anyone can pass right now is Device integrity.
This might give some explanation: https://xdaforums.com/t/module-play-integrity-fix.4607985/post-90382104
This might give some explanation: https://xdaforums.com/t/module-play-integrity-fix.4607985/post-90382104
XDA Forums
🔧 [MODULE] Play Integrity Fix
PLAY INTEGRITY FIX
I've decided to discontinue the PIF project.
Google is increasingly putting up more obstacles, and I no longer have as much time to dedicate to this as I used to. It's been a...
I've decided to discontinue the PIF project.
Google is increasingly putting up more obstacles, and I no longer have as much time to dedicate to this as I used to. It's been a...
https://www.pcmag.com/news/oneplus-to-address-this-software-flaw-after-initial-silence
Oneplus and Oppo took 7 months to fix vulnerability CVE 2025-10184, which tells a lot about their security practices.
Through this vulnerabity, any application or malware could access SMS/MMS data without asking for permission, thereby stealing your 2FA codes and other sensitive data.
https://www.rapid7.com/blog/post/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed/
@PrivacySecureTechCornerChannel
Oneplus and Oppo took 7 months to fix vulnerability CVE 2025-10184, which tells a lot about their security practices.
Through this vulnerabity, any application or malware could access SMS/MMS data without asking for permission, thereby stealing your 2FA codes and other sensitive data.
https://www.rapid7.com/blog/post/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed/
@PrivacySecureTechCornerChannel
PCMAG
OnePlus To Address This SMS Leak Flaw After Initial Silence
The vulnerability can let installed mobile apps access SMS/MMS data on a OnePlus phone without asking for user permission, creating a pathway to steal two-factor authentication codes.
Forwarded from News and Tips
telega! 1.
PROXY_ADDRESS leads to VK servers, MYTRACKER_SDK_KEY is a mail.ru tracker (linked to VK), and CALLS_BASE_URL is sent through Odnoklassniki (also linked to VK) (a cherry on top of the MAX messenger).2. There are ads, also through
mail.ru.3. There's a "proprietary channel blacklist" to restrict users to blogs "undesirable in Russia," and this line isn't in the official client.
4. The client code is partially copied from Catogram*, right down to the variable names.
5. Phone numbers, authorization keys, and a lot of unnecessary data are sent to their servers.
6. The VK Video and VK Clips interfaces are substituted in JS to hide their branding.
7. Icons can be replaced with VK-specific ones.
* bruhcollective owns the Catogram development - @iTysonLab.
Why did this client appear? There's an explanation.
Sources: 💌, 💌, 💌
Please open Telegram to view this post
VIEW IN TELEGRAM
[beginners] Android Recon for Bug Bounty
Learn how to extract APKs, find hidden endpoints & secrets before exploitation using tools such as:
APKeep, APKTool, apk2url, jadx-gui, MobSF, MARA, Drozer
https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide
Learn how to extract APKs, find hidden endpoints & secrets before exploitation using tools such as:
APKeep, APKTool, apk2url, jadx-gui, MobSF, MARA, Drozer
https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide
YesWeHack
Android recon for Bug Bounty hunters: A complete guide
An in-depth Bug Bounty guide to performing reconnaissance on Android apps – from extracting APKs to mapping endpoints, secrets and vulnerable components.
BREAKING: Qualcomm has started killing Arduino development
Qualcomm has "quietly" made some massive changes to Arduino's Terms of Service and Privacy Policy.
According to Adafruit, the new policies introduce sweeping user-license provisions, broaden data collection & embed long-term account data retention, all while integrating user information into Qualcomm’s broader data to ecosystem.
Section 7.1 grants Arduino a perpetual, irrevocable license over anything you upload. Your code, projects, forum posts, and comments all fall under this & it will still remain in effect even after you delete your account.
Arduino retains rights to your content indefinitely. The license is also royalty-free and sub-licensable. Arduino can use your content however they want, distribute it, modify it, and even sublicense it to others.
Section 8.2 further states that users are not allowed to reverse engineer or attempt to understand how the platform works unless #Arduino gives permission
fuck #Qualcomm
Follow @TechLeaksZone
Qualcomm has "quietly" made some massive changes to Arduino's Terms of Service and Privacy Policy.
According to Adafruit, the new policies introduce sweeping user-license provisions, broaden data collection & embed long-term account data retention, all while integrating user information into Qualcomm’s broader data to ecosystem.
Section 7.1 grants Arduino a perpetual, irrevocable license over anything you upload. Your code, projects, forum posts, and comments all fall under this & it will still remain in effect even after you delete your account.
Arduino retains rights to your content indefinitely. The license is also royalty-free and sub-licensable. Arduino can use your content however they want, distribute it, modify it, and even sublicense it to others.
Section 8.2 further states that users are not allowed to reverse engineer or attempt to understand how the platform works unless #Arduino gives permission
fuck #Qualcomm
Follow @TechLeaksZone
This media is not supported in your browser
VIEW IN TELEGRAM
U.S. War Department on troops conducting raids in Somalia: "I can assure you, right, this is an America first department of war and president. So we aren't conducting forever wars in #Somalia. We're not seeking regime change, or, you know, we're not nation building."
@disclosetv
@disclosetv
This media is not supported in your browser
VIEW IN TELEGRAM
🇺🇸 “What threat did the two survivors clinging to a piece of wood in the ocean pose to the United States 1500 miles away?”
Karoline Leavitt directs questions to the Department of War.
Not a good look
🔗
Join us | @MyLordBebo
Karoline Leavitt directs questions to the Department of War.
Not a good look
🔗
Join us | @MyLordBebo
U.S. government-funded labs are actively breeding colonies of exotic Hyalomma #ticks imported from Africa to study Crimean-Congo Hemorrhagic Fever with a 30% mortality rate.
https://www.thegatewaypundit.com/2025/11/exposed-us-labs-breeding-deadly-foreign-ticks-bid/
Join: @davidavocadowolfe 🥑
#bioweapons #terrorism #safe #effective
https://www.thegatewaypundit.com/2025/11/exposed-us-labs-breeding-deadly-foreign-ticks-bid/
Join: @davidavocadowolfe 🥑
#bioweapons #terrorism #safe #effective