webhook.exe is just a placeholder (so i dont get banned), you can use the methods in this video with a token logger, rat, etc
@Amitherabbit11 ай бұрын
very *Educational Purposes
@The_Wafool11 ай бұрын
you do realize computer hacking is very illegal
@indio145211 ай бұрын
have how send the code of the weehook.exe
@Andrew90046zero11 ай бұрын
@@The_Wafool "hacking" is not the same as "stealing people's data and damaging property". So no, hacking is not illegal. What is illegal is using means of hacking to commit actual crimes like stealing, harassing, damaging property, etc. In the same way that teaching people how to pick locks is not illegal either. Though, in many situations, people may state that "hacking" IS "stealing data" as an over simplification of the word. This over simplification causes confusion and makes people think that Hacking is (and can only be) the act of breaking security for the purpose of stealing (and other crimes), but you can hack without causing damage to anyone. Hacking is simply the act of bypassing of security measures, or breaking some other system to gain access or priveledges. But if you have been given permission by the right people to have such access or priveledges, then it's not illegal. And spreading awareness of computer security flaws, like how @ebolaman_ has done here, helps everyone to know how to protect themselves against these exploits. If this was not shown here, it will still be shown in other places where actual criminals hang out. Showing these security flaws can even lead to an eventual patch of the flaws. So keeping this information secret can be more dangerous to everyone.
@InstantNameOfficial11 ай бұрын
@@The_Wafoolno way, its very much legal man what are you talking about?
@tenorton11 ай бұрын
Educational purposes is pretty much the universal dev excuse now
@F1L33711 ай бұрын
I guess it is the same for nudity counting as art.
@lembarkii866911 ай бұрын
@@F1L337t w i t c h
@0xF8111 ай бұрын
Not really, he showed us how is it made so now we're aware how to be careful in case of sus file
@BabyKnxckz11 ай бұрын
it is educational init
@reality578311 ай бұрын
I have soo many *educational purpose* ideas!!!🤣🤣
@Theooolone8 ай бұрын
That right to left override character in the filename was absolutely devious
@Yazan_Majdalawi5 ай бұрын
But I think the extension in the properties menu would still be the right one
@Archimedes.50005 ай бұрын
@@Yazan_Majdalawiit will, but who looks at that In fact many scammers will just name it "pic.png.scr" and hope that the victim has the "hide known file extensions" option enabled, because it's still the default on Windows lmao
@twー5 ай бұрын
@@Archimedes.5000man.. Windows. I'd be on Linux still if devs supported their stuff on it more
@RealThornZ8 ай бұрын
the phrase educational purposes only is the one thing keeping this channel from not being cancalled
@MAGNETO-i1i6 ай бұрын
He hasnt done anything illegal.
@ziadidabde36626 ай бұрын
Y can hide virus by this method @@MAGNETO-i1i
@farn19916 ай бұрын
It's not like he is going to distribute any zero day exploit through youtube video.
@VideosViraisVirais-dc7nx23 сағат бұрын
@@MAGNETO-i1iyeah, nothing legal. It's like watching hentai knowing all characters are over 18
@cracktek_industries11 ай бұрын
The RLO trick is actually something I didn't know even as a CS student, thanks!
@catorlife11 ай бұрын
this is old one, if you do this, even Window Defender can catch this, it automatically consider the file as a trojan even when it's not harmful (test file)
@KennyWlr11 ай бұрын
@@catorlife can confirm, it's been like this for a while now
@Coxick11 ай бұрын
The name will go back to it's original form once you upload it somewhere, so not useful even if the target has no antivirus
@RandomGeometryDashStuff11 ай бұрын
there are file managers that separate extension from rest of name like double commander
@miner423611 ай бұрын
Wow even as a CS student ? Xdd
@serbianspaceforce68736 ай бұрын
malware tutorial 😭
@Drixpy_YT5 ай бұрын
thatts his whole channel
@Wilson-AM5 ай бұрын
lol
@Drixpy_YT5 ай бұрын
@niikolehmainen Real.
@serbianspaceforce68735 ай бұрын
@koolehmainen sure but I'm on Linux so idk if it'll work the same
@threeMetreJim3 ай бұрын
It's useful to know how they work. You can learn some interesting code too, help to defend people against malware and learn how to remove the persistent back doors. Just don't get hit by a crypto locker.
@olafcio11 ай бұрын
.scr is an shortcut for screensaver executables. It's exactly the same as normal executables, but isn't .exe. EDIT: Also, it's better to change the shortcut executable to "cmd.exe /c .\image.png", because when you leave the full path (c:\users\boris\...), it only supports your location of the folder with your username. But still, good video.
@pizzazr11 ай бұрын
True but you're sending it to someone else anyways
@андрей_свиридов11 ай бұрын
Wtf .scr is 'script' not 'screenshare'
@pizzazr11 ай бұрын
@@андрей_свиридов it's Screensaver
@Meletion111 ай бұрын
@@андрей_свиридовeveryone is wrong it’s screen saver😂
@андрей_свиридов11 ай бұрын
@@Meletion1 yeah, that too. I have bubbles.scr installed as my Win11 screensaver :)
@ontop354310 ай бұрын
educational purpose only. Enjoy 💀
@Uthael_Kileanea11 ай бұрын
Good video. Knowing how to do dangerous things helps in defending against them. For example, to defend yourself against this, use a custom system icon pack and disable thumbnails. No antivirus needed or keeping your eyes peeled for extensions. Also, your default icons look cooler.
@Cryptocurrency6911 ай бұрын
Could you tell that how do you switch to a custom system pack and disable thumbnails
@blvdes10 ай бұрын
@@Cryptocurrency69 ask Google
@Uthael_Kileanea9 ай бұрын
@@Cryptocurrency69 Both answers depend on your operating system. You'll have to ask mama Google.
@supercellex4D6 ай бұрын
Doesn't help if you're a high value target, the real trick is to know Windows screensavers are autoran executables, and to check the file type. Or use Unix because NT has one of the most comprehensive filesystem permission systems ever that doesn't have execute as an attribute.
@MightyDantheman5 ай бұрын
You can also just have file extensions visible by default. But the more steps you take, the safer you'll be. The scary part is that these changes only help you if you know what you're looking for. Imagine the normal user...
@GRPYouTube Жыл бұрын
Bro you literally got the the info i was finding for 2 years
@nothink094511 ай бұрын
I was tryna find this for so long and this was here the whole time????
@x4dam11 ай бұрын
frr
@TeeChemist11 ай бұрын
The question is whether windows defender detects it as malicious? Or does it depends upton the the exe that is being executed.
@xodzphone11 ай бұрын
Shit I was doing 25 years ago
@dustindhansen10 ай бұрын
@@xodzphone I was doing it 50 years ago
@MarilynCol711 ай бұрын
Damn its very rare that i find interesting channels ln KZbin
@alibrahym11 ай бұрын
instructions unclear: Im in the prison cell and re-watching this video
@zirtaontop10 ай бұрын
this is very improtant not for scamming but for being aware so its very important also this teaches u that the best antivirus is you
@sanchogodinho10 ай бұрын
Its just wow 🤯 So nicely explained straight to the point!
@antxnioo7 ай бұрын
bro's channel is surviving with the educational purposes excuse
@andreimateas67825 ай бұрын
:)))))))))))))))))
@Bin2Hex11 ай бұрын
RLO is already detected by most AV's .scr is also detected by most AV's now and will be stopped by WD smart screen. the .lnk method works but will be caught by behavior dynamic analysis which most AV's have. double masquerade extensions will also be caught and stopped by smartscreen.
@phir925511 ай бұрын
Is Windows Defender included in "most AV's"?
@MrGenius211 ай бұрын
@@phir9255probably yeah wd is the most annoying av because it just does to much I don't have it because it even blocks my work
@whocares444411 ай бұрын
@@phir9255windows defender is an AV (anti-virus software) preloaded with the windows OS
@miner423611 ай бұрын
@@phir9255likely
@Bin2Hex11 ай бұрын
@@phir9255 considering windows defender is default installed on all windows operating system, then yes it would be considered part of “Most AV’s”
@btarg111 ай бұрын
You can embed code inside an LNK file, and have the link file run it, so you could also fit an image inside an LNK and do it that way!
@macpclinux18 ай бұрын
i admit. i have been pwned by this in the past. it's such a good method
@TSF-NexusVoid6 ай бұрын
mixing this with being able to view other desktops and holy hell you're goated
@vasilis2345610 ай бұрын
The fact that Windows lets you use the RLO in filenames and it actually works is crazy. They didn't think at all about how this could be used, or they did but didn't care. There should be some kind of indication of every type of character in a filename, be that a color change on reversed text or whatever.
@Lagger62510 ай бұрын
What about Arabs and Asians, millions would be pissed about having to type their filenames in reverse
@BytePix_11 ай бұрын
This is scary simple. I don't know if I am suppose to be scared or surprised.
@kamimatsuyama11 ай бұрын
you can check the file extension and size when downloading files
@AresEverett11 ай бұрын
both
@BytePix_11 ай бұрын
Have you watched the entire video? because it can look like a png or whatever file and still run as a cmd. @@kamimatsuyama
@Ransomwave11 ай бұрын
the RLO method doesn't work after uploading a file to 99.9% of file hosts online. you shouldn't be scared. if you're skeptical, you can always just right click and check the properties
@potthegrunt3 ай бұрын
bro is helping the scammers😭
@chillappreciator88510 ай бұрын
Slick demonstration man! It was fun to finally know how do they do this
@makar4ik_cat4 ай бұрын
Thanks to you, now malware creators will make the fake pngs
@AussieCricketOnTop11 ай бұрын
Cant wait to use this for educational perpousus only!
@orren6999 Жыл бұрын
I remember this video
@avocadoricardo695711 ай бұрын
The amount of people who think that clicking the image sent on discord will execute it is hilarious
@pinguluk111 ай бұрын
Wasn't there an exploit that basically did that?
@freen136411 ай бұрын
They just send the embed from a other device once they click the image it’s all a scam
@avocadoricardo695711 ай бұрын
@@pinguluk1 no that’s not possible because of how discord works. When you send an image, discord harvests that information and displays the image, more or less like a middleman, in other words it’s literally just an image, you can’t hide executables in it.
@aidaonYT11 ай бұрын
thats why you only look at the embed
@Hackedpw11 ай бұрын
@@pinguluk1 yeah there somewhat was. for others in the replies: .WebP (note; webp wasn't the only thing that was exploited nor was it only discord related but its the one with most information.)
@lamborghinigamer11 ай бұрын
Now I'm scared for images. Luckily I'm on linux so no exe's, but still scary to think how easy it is to hide the real file extension
@infectieon11 ай бұрын
So ANY image on discord could be laced like this??? Wtf how do you even stay safe from this? Idk how to work linux
@Phobos001_youtube11 ай бұрын
@@infectieonUploaded images with machine code execution will get rejected because they're not REALLY images; The headers and offsets are wildly different and be considered corrupt or invalid. You only need to worry about fake 'images' stored directly on your file system, and make sure not to run them.
@dnchplay-archive11 ай бұрын
Also the reversed text trick used to spoof the file format works only on explorer and a gew other programs, in the most of apps this trick won't work and the original file format will be shown
@CluelessGeek9 ай бұрын
"linux is free if your time is worthless" proceeds to get hacked by an image
@yashi04128 ай бұрын
@@CluelessGeekthis was the cause by my change to dual boot windows/linux to just linux 😅
@aigg_11 ай бұрын
i'm torn over liking this for the educational purpose but also not liking so less people use this maliciously. nice explanation tho, kinda scary
@lowHP_11 ай бұрын
what a legendary mic stand
@unknown-yo2tx11 ай бұрын
cool old techniques you covered
@firebolt36263 ай бұрын
yo man, idk from how many days I've been looking for something like this. thanks a lot for this buddy.
@KalkiKrivaDNA2 ай бұрын
So have u been bleto tech virus to Gmail ?
@guili-p7m2 ай бұрын
I'll give a huge reward to anyone who can make it
@firebolt36262 ай бұрын
@@guili-p7m i was able to do it. so what u gonna give me?
@wallaguest111 ай бұрын
damn it, the RLO trick is quite surprising, for things like this you just better drag the file to the image editor
@letsqooo2 ай бұрын
why is the hardest part to find the ico image😭
@cwypto448811 ай бұрын
that's really cool! im not interested in doing this but i like the style of your videos and your explanation. Subbed.
@touyaakira186610 ай бұрын
I'm like a lot of people here I'm like a lot of people here who are really scared if youtube bans you. Your knowledge is amazingwho are really scared if youtube bans you.
@catorlife11 ай бұрын
the RLO trick is not gonna work since even Window Defender can catch this, it automatically consider the file as a trojan even when it's not harmful (test file)
@ILoveTinfoilHats11 ай бұрын
Yeah this isn't actually a danger to anyone. The only reason windows isn't freaking out about the file is because it was made on his computer. If you were to upload that to the Internet and try running it on another computer it'd get instantly sent to the shadow realm by even the worst of anti viruses
@Lar_me10 ай бұрын
@@ILoveTinfoilHats I tried making my own, and Windows Defender successfully stopped it from executing. Maybe the video uploader disabled Defender for the sake of the demonstration?
@ILoveTinfoilHats10 ай бұрын
@@Lar_me yes exactly my point, even the crappiest of antivirus programs would catch this low-level bug
@BellaTheUnicorn-ko5yt2 ай бұрын
def gonna use this for educational purposes
@muuqii Жыл бұрын
appreciate it man keep up the good work
@ancestrall7946 ай бұрын
First video I see of your channel and you definitely earned a sub. Tbh I don't really see how the "standard users" could not fall for this
@Islandpulledfromthesea11 ай бұрын
This is getting out of hands Thank you tho
@shinydewott5 ай бұрын
Now I am immensely paranoid of all of those background remover and image downloading websites I have visited in the past! Wonderful!
@elepentx26 ай бұрын
One day bro is gonna hack the NASA and say that it was only for educational purpose
@mgtgamer60294 ай бұрын
The best Explanation❤
@svenrawandreloaded11 ай бұрын
you should show people how to detect these files
@pilgrim_gamingАй бұрын
Do you still see a shortcut thing? Yes. It’s not perfect, but that’s pretty good.
@artiflefy137111 ай бұрын
Now I'm scared of discord img
@Aurora.Astralis8 ай бұрын
Love some good bass boosted Xenogenesis by TheFatRat
@arshamshayan Жыл бұрын
thank you for this tutorial ebola man
@alvinrahmanwafi11 ай бұрын
My man earned a subscriber
@MiguelWilson011 ай бұрын
fun fact: there is no educational use for thst
@jasii72066 ай бұрын
I am taking Cybersecurity as a trade, this is educational to me. :D
@tomasprochazka61986 ай бұрын
how come? I learnt that Win is still a mess in these days.
@Noahitis6 ай бұрын
? It doesnt have to have an educational use, he's educating on a subject, which makes the video educational. Whether that be if you were educated on how to infect other peoples machines or to better protect against having your own machine infected, this video was by definition educational as it taught something
@MiguelWilson06 ай бұрын
@@Noahitis that comment was from 5 months ago...
@Noahitis6 ай бұрын
@@MiguelWilson0 people comment on my stuff from 6 years ago, it doesn't change the validity of what I just said
@user-CosmoGT10 ай бұрын
i love this man
@xodzphone11 ай бұрын
Man i remember doing this in like 2001
@LeZylox11 ай бұрын
Old person.
@Will_of_Iron10 ай бұрын
I wasn't even born yet lmao. You're awesome 😎💯
@HhVhji6 ай бұрын
Yes thats what i says its too old 😂😂
@NolenFelten10 ай бұрын
That grassy hill image was taken in Sonoma County, California, where I grew up.
@Ali-wf9ef11 ай бұрын
so if you open an image and it opens it doesn't necessarily mean that it is not a virus.. great job microsoft
@pinguluk111 ай бұрын
this is insane, I better be careful with downloaded images from now on 💀
@NuggetDevs11 ай бұрын
Same here
@Otherwise_111 ай бұрын
Same here
@Ransomwave11 ай бұрын
the RLO method doesn't work after uploading a file to 99.9% of file hosts online. you shouldn't be scared. if you're skeptical, you can always just right click and check the properties
@RoachJr69511 ай бұрын
underrated content creator
@zmudzin44935 ай бұрын
ok how to avoid it now
@ZeroEight5 ай бұрын
don't download anything
@Pr0toPoTaT011 ай бұрын
I subscribed right at.... you know. The one nobody buys. I totally never bought this program but damn if it doesnt seem to always be activated. Crazy.
@HTDMAS11 ай бұрын
but wont Windows diffender block that file if someone trys to download it
@enty-303511 ай бұрын
Its depends. If has a malwer blocks it if dont it not
@user-tc9uz7zy8d10 ай бұрын
Fantastic video
@anony-mousex11 ай бұрын
Insane most of this stuff is just baked into the OS.. Windows really has no regard for user safety
@Calamite-n3p5 ай бұрын
Bro that's insane i really didn't know those techniques before holy shit that's scary
@AdrianLee11 ай бұрын
Why not just make the shortcut point to the hidden webhook.exe file instead? If they're looking at the properties in any case, they'll see that it points to an .exe and not an image 😅
@guili-p7m2 ай бұрын
I'll give a huge reward to anyone who can make it
@sab_33fr8 ай бұрын
This is very interesting. Might use it against scammers
@PhantomZaya Жыл бұрын
when i do extention spoof #3 the output file is (img name).png.lnk why?
@ebolaman_ Жыл бұрын
.lnk is the shortcut extension
@brunio16776110 ай бұрын
nice dude, next turorial: how to empty someone bank account (just educational)
@htgg9006 Жыл бұрын
Skid material We don't need more 15 year olds roaming around discord sending malicious files to other kids
@ebolaman_ Жыл бұрын
i’m literally a professional skid
@htgg9006 Жыл бұрын
@@ebolaman_ lol, why not progress deeper tho?
@b4rlvnna Жыл бұрын
@@htgg9006 what makes you think he hasnt
@beamsandshits Жыл бұрын
the only thing skid here is the skidmarks in ur underwear bro
@htgg900611 ай бұрын
@@beamsandshits your channel is literally roblox exploits, why you bein a kid instead of doing real sh*t? No need to get mad but if you're into cyber do it all the way and not like a clown
@spartv15378 ай бұрын
technically, you can go deeper with shortcut method without spoiling hidden file but it's gonna be multi-task command for cmd
@natoplly Жыл бұрын
Hi I noticed that there is no multi-tool video at your place. Could you please share this video on e.g. Google Drive or something else.
@ebolaman_ Жыл бұрын
github.com/EbolaMan-YT/Multi-Tool
@natoplly Жыл бұрын
@@ebolaman_ thank you good person!!
@AsterLight11 ай бұрын
Ngl downloading a file from this guy is the last thing I would do
@nonstoppe96 ай бұрын
Educational purposes=educating hacksers
@Darkbeamer01 Жыл бұрын
can you make a slightly less complicated version?
@ebolaman_ Жыл бұрын
alr
@Darkbeamer01 Жыл бұрын
thanks alot first time a youtuber actually responds to their viewer good job@@ebolaman_
@pyro488811 ай бұрын
i mean its already simplified enough its not that hard to follow
@Darkbeamer0111 ай бұрын
for me it is@@pyro4888
@EvanVR19876 ай бұрын
thanks, now i "educationally" know how to give someone a virus.
@OfficialSwazzzy11 ай бұрын
hello do you know how to make a hwid spoofer? been watching these videos and tryna make one using the multi tool method as well.
@ninjaxboy5 ай бұрын
Educational purposes only is the special key to not getting banned
@Xaredion Жыл бұрын
what app did you use to 'short cut' the unicode rlo character?
@ebolaman_ Жыл бұрын
right click>insert unicode character
@Dino-zg2vx11 ай бұрын
@@ebolaman_ he wants to know how youre able to see that unicode thing
@nuggetvb11 ай бұрын
@@Dino-zg2vx when youre renaming the file just right click on the file name and it should give you those options. he literally told you to pay attention
@joedartonthefenderbass11 ай бұрын
@@Dino-zg2vx it's just built into windows
@mapg5198 ай бұрын
WE ARE MAKING A RAMSOM WARE WITH THIS ONE 🗣️🔥🔥🗣️🗣️🔥🔥🔥🔗🔗🔗
@ௌௌௌௌௌௌௌௌௌௌௌௌௌௌௌசழ7 ай бұрын
“Ramson”
@phsycdelic11 ай бұрын
When uploading it on discord, does it act like an actual png. Also what stubs do you recommend for roblox
@ebolaman_11 ай бұрын
idk abt roblox stubs but yeah it only works w discord if u zip it
@phsycdelic11 ай бұрын
@@ebolaman_ damn, are there any stubs you'd recommend
@omggggggggg-jkyss11 ай бұрын
@@phsycdelicjs learn c stop being a skid >w
@Sown.11 ай бұрын
@@omggggggggg-jkyssmalware in C is very annoying to make
@pyro488811 ай бұрын
@@phsycdelicwhy u wanna beam so bad😂😂😂
@entic20710 ай бұрын
Thats why I always use the “show file extension names” option
@TSMSnipeMan52YT10 ай бұрын
doesnt save you buddy
@WukCR中文7 ай бұрын
how does the webhook exe work
@_neins6 ай бұрын
Discord bot
@luimu5 ай бұрын
it sends post request to an url
@cyber897211 ай бұрын
bro is a prodigy
@boing767911 ай бұрын
what about doing it by adding the executable to the shortcut as an alternate data stream so you only need to download one file
@deeeeeeeeeep8811 ай бұрын
You will have to go into the registry to show the file extension but since the file extension for a shortcut is .lnk, it would seem really suspicious
@memmoman6 ай бұрын
Thank you ebola man
@HeyVSauce11 ай бұрын
this is why i avoid windows at all costs; over here on linux, you need the executable permission/flag set if you want a file opening to result in it running code
@Bo0mber11 ай бұрын
Don't pretend that linux doesn't have a shit ton of other vulnerabilities. And I'm not even talking about how painful it is to use
@HeyVSauce11 ай бұрын
@@Bo0mber "painful to use" clearly you havent used windows with it's painful constant crashes & all around instability "vulnerabilities" true, however let's not pretend windows doesnt have the same ones + a bunch of phishing ones - this video essentially describes a text-rendering bug allowing you to perform a phishing attack, something that i would like to see happen on linux tricking users into opening an "image" is way easier than any phishing attack that relies on literally anything on a modern, up-to-date linux system ever will be also, since we're now comparing actual vulnerabilities, i can still load genshin's kernel mode driver for free kernelspace privilege escalation on a system which never had genshin installed - it's still trusted by windows :) microsoft doesn't give too much of a fuck about fixing legitimate vulnerabilities, linux kernel & other critical-inifra developers usually do.
@HeyVSauce11 ай бұрын
to clarify: the text-rendering bug is only a bug due to it's possible use-cases; I get the use for an RLO, it's just considered a bug due to it being abusable in this specific context.
@Bo0mber11 ай бұрын
@@HeyVSauce saying I haven't used windows is so ridiculous I don't think you believe it either. As far as stability goes, from my quite limited experience with ubuntu, I can say it is way less stable and usually when you try to make something work in linux it takes several hours of recearch, whereas in windows it just works right away. I also don't remember the last time I've seen something crash, maybe it is because my computer isn't 20 years old? As for vulnerabilities, I'm not arguing about how many there are in each os, I'm just saying it's quite dumb to pick an os based on this factor when "preffered" os isn't even free from them
@HeyVSauce11 ай бұрын
@@Bo0mber ubuntu is maintained by canonical, a company not known for anything except being idiotic amongst the linux community. when I run windows for testing shit, I'm running on like 2-3 year old hardware, and the amount of random crashes I get when doing the simplest of things is insane - sure, it won't just crash when opening notepad, but it is a very unstable operating system. even just the APIs it provides to usermode applications cannot stay stable for 0.3ms
@thereaper379610 ай бұрын
Esto podría ser bastante útil algún dia en el sentido "educativo"
@fredo1337711 ай бұрын
Release the code that sends the message to the webhook as well as to the logger.
@ebolaman_11 ай бұрын
the code that sends the message to the webhook is an placeholder for a token logger
@KyuDoesCode11 ай бұрын
C# ? C++ ? Python ?
@Maxx2311 ай бұрын
c#@@KyuDoesCode
@freen136411 ай бұрын
Look for it on google
@hoangat718810 ай бұрын
Keep it up man! That's awesome
@imauser30111 ай бұрын
you can literally teach people how to obtain interesting substances and add "educational purposes only" and completely pass off youtube
@thelibyandxer6 ай бұрын
Imagine doing this in school 😭💀
@IamOsvy11 ай бұрын
it's very obvious that no one is going to use it in an educational way and they will use it for doxing.
@CramePus11 ай бұрын
hahahah really? main point you donkey, have a good xmas tho and stay safe
@mrhonkhonk611611 ай бұрын
no shit sherlock
@GodPhazer11 ай бұрын
I'm impressed by RLO, I didn't know.
@guedaigegedeon2042 Жыл бұрын
THANK YOOU
@ebolaman_ Жыл бұрын
nppp
@tryingtonot336911 ай бұрын
casualy doing gods work
@zerayde Жыл бұрын
what is ur patreon
@ebolaman_ Жыл бұрын
www.patreon.com/EbolaMan
@toNieh10 ай бұрын
I know you're saying this is for "educational purposes" but this mainly enables bad actors to do these kinda of stuff
@nolansrich10 ай бұрын
are you dumb...
@QuavanteZingletonTheThird11 ай бұрын
Ebola man!
@davidddo11 ай бұрын
Proud to be a thiojoe watcher
@riveralonzo10 ай бұрын
I’m literally working on defense against file extensions and file uploads right now… gonna see if spoofed files get through what I wrote.
@ThatNerdGuy06 ай бұрын
Ehehehehe Definitely going into the saved videos
@SDRIFTERAbdlmounaim6 ай бұрын
i clicked expecting to see the exe binary turned into tiny black and white squares in a photo and converting that photo back to executable code