Disassemble and reassemble again?
Disassemble and reassemble again?
His arms are out for a hug
Thank you! :D
consider the following
You add quotes on “art” and then draw cool mechs with tiny circuity details all over, you can’t do that! :P
laughed at this one
wish websites had silly 404 pages like this. a few vectorizings and this duck could be one too
that’s just duck dna dont judge
Kinda looks like he’s wearing a big duck nose mask.
damn i just realized he was packin’
sorry but
I don’t have talent… but I have a reference image, a mouse with the sens all the way down, and a half-hour to waste.
HUZZAH!
neuron activation
duck girl
i haven’t drawn a person since grade school but this post has given me the courage
oddly a duck is the last thing i expected to see
Add an exclamation point to the front of the image <3
Like this:
![](https://happy.quack)
Not this:
[](https://sad.quack)
“Duck!”
“Ooh, where–”
lmao, what?
Not fishy at all! It’s like a lockpicking fan asking about locksport.
If you’re looking for examples, GitHub has a lot of CVE proof-of-concepts and there are lots of payload git repos across git hosts in general, but if you’re looking for a one-stop-shop “Steal all credentials,” or “Work on all OSes/architectures just by switching the compile target,” then you’ll have a harder time. (A do-one-thing-well approach is more maintainable after all.)
If you want to make something yourself that still tries to pull off the take-as-much-as-you-can, you should just search up how different apps store data and whether it’s easy to grab. Like, where browsers store their cookies, or the implications of X11’s security model (Linux-specific), or where Windows/Windows apps’ credentials and hashes are stored. Of course, there’s only much a payload can do without a vulnerability exploit to partner with (e.g. Is privilege escalated? Are we still in userland? is this just a run-of-the-mill Trojan?).
Apologies if my answer is too general.
wdym? does the NSA keep a “overnight power button habits” sql table on us lol