ffc9f6 () No. 9038853

feeb4e795286ef....jpg (101 KB, 255 x 143, 2048 : 1151, 8chanbig.jpg) (h)

bc46b8b332562e....png (116 KB, 255 x 93, 1796 : 658, Screen_Shot_20....png) (h)

e30f361295d160....png (156 KB, 255 x 173, 1497 : 1015, Ghidra.png) (h)

Long time lurker/autist, breaking silence. Have tried to get hacker community in on this but to no avail. Ghidra is a tool for reverse engineering. The image itself has code in it. I have been using radare2 to reverse for a long while on q images. Remember "graphic is key" and "you have more than you know"

Have been doing research in parallel with some others on Q posts for a while looking for stegonography, encryption keys, and more and have found bits and pieces that are near misses. See twitter for more details, though much hasn't been released. https://twitter.com/spaceB0xx/

But we need to get as many people who are cryptographically minded on this. It has been a struggle to get others involved on this route.

94e2ff () No. 9039279

b8955925eaf574....png (9696 KB, 128 x 128, 2480 : 11628, found_this.png) (h)

hey, new fag here.

I used Ghidra (new for me too) with the last two images (Qdrop 4109 and 4108). I found this:


f8082f () No. 9040069


Ghidra isn't really a steganography tool

more a tool to crack programs, reverse engineer programs and some limited forms of security analysis and network analysis

>It has been a struggle to get others involved on this route.

ya, it has, been trying for a while


hacking, cracking background

some crypto & steg experience

been looking at Q posted graphics and so far have found nothing substantial either


a. nothing to find

b. don't have password for specific program used

steganography is almost impossible to crack if you don't know the program / algorithm used

still waiting for further crumbs from Q

ab834d () No. 9040860


>Ghidra isn't really a steganography tool

Q re-posted the link to Ghidra last night along with two pics, one of them a gift.

He doesn't post things without meaning and stated:

"Toolkits can be helpful. Q"

Based on that I think you are incorrect.

I believe there is something to find in all of his pics.

7fce13 () No. 9041086

be390a9ddbc4c5....jpg (34 KB, 255 x 143, 1024 : 576, b5e35cb0c39f6c....jpg) (h)


Everyone is dumping their tools and that's nice and all but, what about reverse-engineering the stupid app they want people to use? The COVID Symptoms App or w/e.

ffc9f6 () No. 9041102


This is correct, that it isn't a stego tool. it is a reversing tool. What I was trying to communicate is that there is stegonography in many of these images, as well as embedded code. You can see some of my posts in the twitter link.

The image of Ghidra that I posted is the disassembled 8chan image. I should have been more clear

ffc9f6 () No. 9041137

8d9e95abb4179b....png (47 KB, 255 x 117, 610 : 280, Screen_Shot_20....png) (h)


For example, the exifdata from last night's 8chan image also has a "Keyword" embedded in it. That is stegonography. See this screencap

There is something here I am convinced of it. I have done much crypto and cracking. Ghidra could help reverse binaries, and find binary/executable data in seemingly arbitrary files.

3347cd () No. 9041408

Thank you for this discussion, I am studying Industrial and Human Factors Engineering as a second masters track. Stopped Course for bit for health and money issues then November 2016 miracle happened. Followed crumbs from others to Q. Which direction are you headed with the this dig?

ffc9f6 () No. 9041828


The Ghidra reference is really for reversing, so in that regard, I would try to figure out what these functions are actually doing inside of the image. The fact that they is a "Keyword" in the exif data is a start.

What I have been working on the past number of months is finding cryptographic keys. I am convinced that Q post 1441 has an encryption certificate in it. I can see pieces of it, but can seem to cryptographically, or stegonographically extract them.

What one of the above posters said is true, that if you don't have the key and don't know algorithm, then decryping is worthless.

However, Q posted the work "Spray" (like password spraying?). A technique I use when hacking things with a password. Just brute forcing the crap out of it.

ffc9f6 () No. 9042267

5b66ff07518655....png (9 KB, 255 x 65, 407 : 104, Screen_Shot_20....png) (h)

And also, the "present" image has a very unique string in the image data….

Using the basic "strings" command line utility on Linux/MacOS

ffc9f6 () No. 9042277


Excuse me… the "gift" image…no present

4948e6 () No. 9042464



is that brainfuck code?

4948e6 () No. 9042478




4948e6 () No. 9042549

51ca88d73d4ebd....png (51 KB, 255 x 118, 984 : 456, ClipboardImage.png) (h)



i um think that is a coincindence

d1ffc5 () No. 9042718

Pretty sure Q is showing the world how this language is unknown to quite a many and is something that needs to be addressed. This level of programming .. To older people it is simple.. a very few at that. and to a great many more they are more interested in the higher levels of code beyond the base. This is interesting to see again. Especially considering how game developers have been requiring users to submit to playing via essentially a streaming service now.

d1ffc5 () No. 9042731


Think code injection or the like to induce reactions etc. this is beyond the gaming level but it is a start.

94e2ff () No. 9042906

what if parts of a program were hidden in different images?

ffc9f6 () No. 9042985


Exactly what I'm talking about! Now we are getting somewhere. You think a random brainfuck string is embedded in a Jpg binary, entitle Present? And that value ens up being -17? I don't think so.

4948e6 () No. 9043015


tbh i couldnt reproduce that result on any other online brainfuck compilers. like i said, seems like a fluke. i didnt put enugh time into it to try to hand convert whatever that string is in bf.

ffc9f6 () No. 9043048


Well, if you load the image into Ghidra (and originally I was using a software called radare2), there are "bytecode" functions which are identified. Bytecode is compiled binary/assembly which is actually executable code. (this is why "stegonography" and such are closely correlated with the work I have been doing.)

Now, when you are looking for random opcodes, in a sea of bytes (all the images) you are bound to run across a crapton of false positives. Like, a lot. So the key is to be able to know if any bytecode returns are legit (ie, the assembly code interpreted actually makes sense)

The code in the 8chan image does. Now what it is doing, I am not sure yet. But Ghidra interprets it properly as functions with parameters which are initialized, and then referenced/assigned, with conditional loops etc.

This would be hard to do randomly

ffc9f6 () No. 9043078


They seem to be pieces to a binary whose "entrypoint" I cannot find. It also helps to have an idea what architecture the binary pieces were intended to run on, as that will dictate how the bytecode is actually interpreted.

ffc9f6 () No. 9043105


What Architecture did you import as?

94e2ff () No. 9043296

961772ee962b53....jpg (1037 KB, 128 x 128, 2090 : 1756, try.jpg) (h)


you mean this?

ffc9f6 () No. 9043374


You said in Ghidra you imported those images, and found said doc. when importing raw data in Ghidra you must sepcify architecture.

O just detail where you found said pdf link

ffc9f6 () No. 9043401



Disregard, I got what you mean. My brain is on empty. And thanks for those screengrabs

7d5539 () No. 9043433


Tried concerting the +/- to number string and letters for passphrase…did not appear to work with steghide passphrase. There is definitely information in the gift file. If you fire up the image in GIMP you will find blocked out pixels at another layer. Use the brightness and contrast tools in gimp to reveal.

The "punisher pic" also reveals interesting information when using the brightness and contrast tools in gimp haven't fully revealed the information but there are patterns there. Ghidra may help on the gift image. I had an older version and was unable to get through the python analysis before it would crash my systeem. (I was on a shitty laptop.)

4948e6 () No. 9043470

64bd15f6f7e698....png (1857 KB, 255 x 237, 1694 : 1576, Screen_Shot_20....png) (h)

710638 () No. 9043561


Close….go the other direction on the spectrum to see if you see what I am seeing. Here is the hint I used…Get it to the point where you are making "red cross" like lines in the forehead area. I will have look at what you are seeing. TY

e84dea () No. 9043666

e6f72e3e148387....jpg (13 KB, 225 x 225, 225 : 225, barcode.jpg) (h)

4948e6 () No. 9043689



Believe it or not, i made a python program to read one of them

4948e6 () No. 9043711

bbcc65c22d69a1....png (14 KB, 87 x 113, 87 : 113, skull_code.png) (h)


#!/usr/bin/env python

from PIL import Image

im = Image.open("skull-code.png")

width, height = im.size

for y in range(height):
for x in range(width):
r,g,b = im.getpixel((x,y))
if r > 200:
yellowAsZero += "0"
greenAsZero += "1"
yellowAsZero += "1"
greenAsZero += "0"
yellowAsZero +="\n"
greenAsZero +="\n"


It didnt come out with anything but that was my quick attempt

4948e6 () No. 9043728

7da1c32d63183e....png (257 KB, 255 x 251, 1618 : 1592, Screen_Shot_20....png) (h)

4948e6 () No. 9043734


8kun snake logo ? i almost see it if i stretch my imagination haha

6e1353 () No. 9043835


I like your thinking anyway. Nice work!

I was thinking tineye search for original. If difference file compare script.

872778 () No. 9043883


So moving the spectrum to the other end reveals a braille like dot patterns. Gets the image to red and white lines ( a few red / white crosses) reveals dot patterns the remind me of braille. Haven't tuned it in fully for decode. Just throwing that out there. Braille (dot patterns) is a common message passing technique for StegAnons

8b7181 () No. 9044073


looks like a voice frequency

94e2ff () No. 9044191

f4041d784a23eb....jpg (615 KB, 67 x 255, 872 : 3308, comp.jpg) (h)


I tried to use the parts as if they were a puzzle…

I don't think I have much, though… I tried to follow some kind of graphic logic

4948e6 () No. 9044377


It looks like sprites of an aztec dude running and doing flying kicks for an 8bit game

94e2ff () No. 9045175

066e5627b50339....jpg (3694 KB, 116 x 255, 2480 : 5443, stripes.jpg) (h)

it's probabily nothing but… the tie strips should appear also in the reflection on the desk, right?


dffc81 () No. 9045788

Anybody get Ghidra to work with Eclipse (java)?

3347cd () No. 9046344


file names seem to be pointing to abstract items or strings of information that are not random. You are aware of the cypher the founders used? books at the lib of congress cover it

So here is a path from the punisher file name capitals TTiC the file name transposed, missing, or incorrect syntax are paths to endless data… seems to point to 1-99 items that tie each bad actor by money deed generational to the main death cult [93]

64776a () No. 9046487


If this is part of the "map" then "news" unlocks it

2a5bd7 () No. 9046953

How do we know that there isn't spyware or malware or a

rootkit or whatever, embedded in the ghidra code itself?

Stegano & reverse-engineering compiled code both interest

me, and I've always suspected (from the first time that Q

said, "you have more than you know"), that there might be a

lot of stegano in at least some of the images (and I have in

fact gone and looked inside some, finding nothing – which

doesn't mean it isn't there, but might mean there isn't – so,

this all interests me, but I'm not installing software on any of

my computers, that is DL'ed from this Wilderness of Mirrors,

unless I have solid reasons to trust it isn't itself malware/d.

2a5bd7 () No. 9046965


If future unlocks past, then maybe

"future" is the keyword – to unlock

some or other thing that is tagged

with "past" as a label.

I'm just speculating, here.

3347cd () No. 9047252


you don't so sand box it

ffc9f6 () No. 9047349


Amen to this. These tools don't need internet. Running in a networkless VM is highly recommended.

4d5cd6 () No. 9047369


>How do we know that there isn't spyware or malware or a rootkit or whatever, embedded in the ghidra code itself?

You mean so the NSA could get access to your personal information?

Have you even thought this through or are you just typing things as they flash into your little brain?

b3809b () No. 9047423


>>9046953 ( Yep Yep never trust anything)


Sandbox isolation works well but at the end of the day if you are running anything other than linux secure OSs you are already sharing your information. This is why we are actually working with Ghidra. To mitigate that challenge. Kinda like cleaning the garage. You have to make a mess before you can get cleaned up and organized.

128f74 () No. 9047426

8220b8f1a7a011....jpg (159 KB, 241 x 255, 654 : 691, Arrrrr.jpg) (h)

Thanks For The Thread…

These Tools ..Will Be Greatly Useful In The Months To Come.

Peace & Respect.. ..

Righting The Ship.

933f4f () No. 9047567


WHO knows?

Keep thinking like this.

26a5aa () No. 9047613


Jah me heart'E: ['ow's Davy do'n?]


F.I.R.E. ('n 'Hank's Louise) 'bout time, too.

Fire. . .. … (phive)<:>Live




Again: Louise_5; Out STAND'n!



YouTube embed. Click thumbnail to play.

492716 () No. 9047720


the orange section could be pineal related.

7289c2 () No. 9048040



ce0691 () No. 9048298


Doesn't matter what is embedded in source of Ghidra. I have come about two and a half years following Q. I have to believe that if there is embedded code, it must be beneficial. Otherwise we don't "trust the plan", and if that WHAT THE FUCK ARE WE DOING HERE? In for a penny; In for a pound! WWG1WGA!

ce0691 () No. 9048307


How about if Q has embedded a key to unlock steg info in every pic they have posted? Worth building a Virtual Box! Hell, its worth a shot on my home laptop! LOL

ce0691 () No. 9048359


Maybe faggot, but we also have almost three years worth of drops to sort through and and see if any of them get new meanings because of this.

7a2a58 () No. 9048580

the filenames of Qs Images have always intrigued me.

Maybe put all of them chronologically together and decode?

I'm sure if someone gets creative enough there will be something.

other Ideas

- try putting meta/exif-info tags together from multiple Images

- always the "last" or "first" few characters of the actual Image Info

Might also make sense to think how one would go about to code info-snippets into these images.

I'm quite sure that if there is more info embedded in the images, in the end its something simple.

If there is info like "the Map" there must be a lot of characters - and it would take multiple Images to hide it, since the malformation of jpegs can only go so far until it breaks noticably down. Keep this in mind while experimenting.

3347cd () No. 9049428


true on the garbage

3347cd () No. 9049488


my oldest fine so far was 1867, railroad times, a financial newspaper with article written by [Librairain of congress] He was wrote about the need for central bank to foundry of their works…. projection for the changes to come

79faac () No. 9052108

Ghidra / SRE Resources

For those that might be interested and struggle with how to start, or can't find help.

Course and Resources

Reverse Engineering Tutorial: How to Reverse Engineer Any Software


Data Structures and Algorithms: Deep Dive Using Java


GitHub Ultimate: Master Git and GitHub - Beginner to Expert


The Complete Networking Fundamentals Course. Your CCNA start


Complete Python Bootcamp: Go from zero to hero in Python 3





Articles and Blogs

How to start out in reverse engineering?


How to Reverse Engineer Software


The Power of Reverse Engineering


86e65b () No. 9055529





Did a search last night on images posted with the name unknown. There are not that many …. if I remember correctly there were 8 total.

Just following this path for a bit digging through the metadata and potential strings.

86e65b () No. 9055579


That would be nice.

I am enjoying the show and playing in an area I love. Its great expanding my knowledge on Ghidra, and other NSA tools and playing around with Steganography. Its great hanging with like minded anons diggin for the truth and taking down the [DS} at the same time.

Comfy AF!

0476eb () No. 9055716


Not seeing anything like that, it should be embedded code, not a link.

What language/architecture did you use?

Can you post a screenshot of the link in Ghidra?

b65ee1 () No. 9055905

40e881b5684b4c....jpeg (13 KB, 255 x 179, 300 : 210, 8kuntech3.jpeg) (h)

8077ab () No. 9055934


Not seeing this either….Can you post the steps you performed do find this pdf?

b65ee1 () No. 9059549

Could Q have dropped it to reverse this Pandora's Box on the NWO's control system?

This guy found what looks to be the motherload of control grid

YouTube embed. Click thumbnail to play.

e58177 () No. 9059824


You’re full of shit. Your screen shot shows Copia.exe which is malware, not the JPEG file. There’s no pdf file in the image.

Fuck off.

605726 () No. 9059825


The only thing he could've found was the link in encrypted form. The file is too small to contain the PDF. I'd say he's lying - no reason not to post where the link was.

e58177 () No. 9059836


He’s full of shit.

2a5bd7 () No. 9059853


You know, I almost impulsively carpet-bombed you back with insults – but then I realized:

you are almost certainly sperging out, and not shilling, so, hail and well-met, brother anon.

#pro-tip: on the internet, $="no one knows you're a dog".

One posts things into the vasty deep, to see what calls back. One baits a hook, according

to what fish one wishes to catch. One scans this part of the EM spectrum, and not that one,

to see who is broadcasting here, and not there. One pretends to be this kind of poster, so in

the event of a reply, one may make inferences from data unobtainable by posting as some or

other different set of personae.

Alle ist so kläre wie schläm?

605726 () No. 9059895

The only picture I've found anything is the punisher pic with the grey stripe at the lower edge. That one has 60kb of extra data. Went through it with a hex editor and binwalk. There's two valid png blocks of which the first is the image. The second I have no idea what is.

e58177 () No. 9059917


Your image of Ghidra…There is no function in the main window, how are you seeing that in the decompiler? The address in the decompile image doesn’t match the listing window.

e58177 () No. 9059989


Which Q post is that in?

2a5bd7 () No. 9060192


I had had similar thoughts, and it is interesting to see them echoed.

But I have been following "this" story, in its broadest context, for, I dunno, close on 50 years. It surprised me completely when I realized that was the case, about 35-40 years in: I had always thought it was a bunch of separate, unrelated weird things, but it turns out it is one big weird thing. Or mostly so, anyway.

The digger you deep, the getter it weirds. The sophistication of some of the less obvious psy-ops is mind-bending to behold. Their implicit malice, inarguable.

If Clown City in Langley Virginia is setting up false drop boxes so they can catch, and do wet jobs on, bona fide US patriots who've decided to risk all and be whistle-blowers, then …?

If Snowden was sent to Kansas as an infiltrator, to do sabotage, so an entire, vast, fake privacy-theft crisis could be run, to conceal-in-plain-sight, another, far vaster one, then …?

If the moment facial recognition CCTV-harvesting AI's become technologically feasible, all of the sudden tattoo parlors start springing up everywhere because "it's popular", then … ?

If the rabbit hole goes down, and down, and down – if you drop a pebble, and it never seems to hit bottom, ever, ever, then …?

It's not that I don't "trust" Q; it's that at the end of the day, I don't trust.

When Q came along, I was core-optimistic for the first time in my life. So there's that.

But watching previous proto-counter-coups, however feeble, get crushed outright by cold-blooded murder ($={FBI "they're all insane"}) and decent, patriotic human beings die cruelly at the hands of a deeply-embedded Evil, because no one "normal" realizes what is going on in front of their very eyes (not blindness, but trance), has had this result: at the end of the day, I do not trust.

I hope Q is everything it promises to be. An America where the US Constitution is actually, you know, observed, and where, to pick a tiny example, you have to actually be sworn properly into the Office, in order to discharge the extensive executive powers of The President of The United States of America, would be an unprecedented (sic) and wonderful, World-improving thing.

But at the back of my mind is the thought, that (like the badly written final minutes of the movie, *Basic*, except more credibly and coherently), as every unveiling so far (I did say almost 50 years, right?) has got us to "bedrock" that proved to be 1" of mudstone, with a trap-door entrance right there, to another hundred feet of ladder, down, down, down into the dark – this could be just another one of those situations, only fancier, and with better theatrical props.

I do not trust. Not, at heart. Or rather, obviously I do: I am fully aware this channel is approximately as "private" as FB, just with ostensibly better-intentioned Overwatchers.

Except, I don't.

2a5bd7 () No. 9060366


True. Also traffic analysis: not just the "Q Proof Offsets", but any other

patterns in the timing, timing-correlated size (length) and number, etc.

of the drops. Comms analysis isn't just about content alone.

I think the only "optimal" strategy is to start digging anywhere, and if it

doesn't hit pay-dirt before you get bored, stop and start digging in some

other place – iteratively.

Unless you have hard evidence a particular approach is a total waste of

time (and if so: serve it with sauce, of STFU & GTFO), don't shit on any

other Anon's wild guess.

Q has given us N haystacks hiding M needles, N>>M – except some of

the needles are something other than needles, and we don't know what.

The only reasonable strategy is to search anywhere. For anything.

All of which is a roundabout way of telling you to fuck off.

605726 () No. 9060410



We are ready.

[Set 1]

Mission good.


2a5bd7 () No. 9060480


Especially since showing us where the link was, and how concealed, would hint at methods for finding others, elsewhere.

I interpret that whole thing as being a slide.

The Shills on this (Ghidra) sub-board have to use different shilling tactics than on other sub-boards. Different human terrain here.

e58177 () No. 9060586


>>Especially since showing us where the link was, and how concealed, would hint at methods for finding others, elsewhere.

Except there is no link hidden in that file, the screenshot is not a representation of the jpeg file but is of a completely different file that is a malware executable.

It is a slide, but not a concealment of knowledge. That person only knows photoshop, not Ghidra or reverse engineering.

ddd144 () No. 9062790








I put the screenshot in the first post but I had checked the "spoiler" box (newfag here, as I said, this platform is new for me), but you can still see it on my first post, though…

In the image there is the sequence I followed.

I never said the pdf is IN the image, I just searched on internet what appeared in the code (it was not my intention to make it look as if I found the pdf inside the image, but English is not my first language… what I meant is that I arrived to the pdf thanks to what I saw with Ghidra… and for that I attached a .png file with the steps I followed)

In the screenshot png file the steps are:

I just put in the browser what there was in the image according to Ghidra (so I tryied different parts in the browser) and

when I searched for "INTMEM:00-INTMEM:07" (which appeares at the beginning when opening the image with Ghidra, as I showed you in the screenshot), I found the pdf IN the internet

(so I found the pdf copying what Ghidra showed me and pasting it in the browser).

About Copia.exe:

I saw only now that I used the Copia.exe for the screenshot, here what it is:

I tryed to change the extension of the images to see if Ghidra showed me different codes (it may be stupid, but as I said.. that was my first time using Ghidra… I also tryied to change the images in .txt … ). There were no differencies between the original image (which I used for the research I was talking about) and the image with the extention modified in .exe (I just renamed it to distinguish them).

So here what happened: I used for the screenshot the version of the image with the modified extension…

…because here it was 3 am and I took the screenshot of the .exe instead of the original one for mistake… also because there were no differencies in the codes, so… my mistake in that.

You can check what I'm saying by opening the original image, copying and searching for the "INTMEM:00-INTMEM:07" and you should see the pdf in the first page (depending on the browser you are using, of course…)

(PS: I did not copy -in the attached png image- the full pdf I found IN the internet -not IN the image- as it was too long.)

ddd144 () No. 9063059


…and I thought the pdf could be something because if I try to copy and paste any part of it, what I paste is not what the pdf shows.

In example:

if i try to copy the first sentence: "Multicellular development depends (…) organization. "

what I have in the pasted text is:



that's why I shared it with you.

It may be nothing, though…

c18b56 () No. 9063132

To the Anons in these threads, don't expect too much from Ghidra.

A lot of the nasty stuff that compromised mobile applications will be doing won't be on the app, but on the server they communicate with.

At best, Ghidra will be able to show and tell what information is being sent off and to where if they're not smart, as well as encryption methods and programming libraries used.

But the above is still a best case scenario for digging. Most decompiles won't return much.

07a54e () No. 9063162


I have had that copy and paste issue if i try to copy it from the browser, usually have to open it in a standalone pdf program

ddd144 () No. 9063210


Yes, it happened to me too, but I downloaded the file and opened it with different reader and still does it… but again, except for the fact that I find the topic of the pdf interesting,

the copy issue may be nothing… and the pdf itself may be not related to what we are looking for…

I just shared here because I know there are many people who are better than me in this kind of things and in digging.

b55d6c () No. 9063708



Try this.

It's a graphic/analytic that has gathered up all the images that Q has posted and then cross references all of the filenames with text that Q has posted.

Freedom.png : 'Freedom' appears in 55 drops.

Links to all related drops and images.


2a5bd7 () No. 9063737

Is it possible to embed (stegano conceal) non-rendering pdf pages/docs *inside* another pdf? If so, how do you extract the "hidden" ones? If there is no pre-existing software to do this, how do you do it "by hand"?

Similarly for .doc, .docx, .odt, .xls, .xlsx, .ppt, .pptx, etc., etc. – but mainly for pdfs (I have some target files for that right now).

If a pdf weighs in at >10Mb, but renders as just one, single, miserable, boring page of mostly text & near-constant background color – is it a reasonable target for steganalysis? It should be (from the 'surface' needs, a way smaller file, no?

All the steganalysis tools I know are for image files – ignoring the obvious trick of opening any file format whatever either in a hex editor or as if a txt file.

I know just enough stegano to misunderstand everything badly – are there tools for the steganalysis of file formats that are *not* image file formats?

Hiding something as LSBs (etc.) does not make sense (that I understand … yet), except for image files. What are the (most frequently found in the wild) stegano methods that are based on other file formats?

For one thing, it is now public lore (thought not "knowledge") that you can hide things in *image* files. Therefore, people who want to avoid random scrutiny comping their stegano at the hands of script-kiddies (such as myself) probably would have shifted to other file formats.

Throw me a friggin' rope, here (no noose jokes, please: no noose is good noose).

– An anon.

b55d6c () No. 9063750



I looked at Facebook.apk a couple days ago and found alot of camera related functions, alot of location functions, other sensors trying to detect the direction the user is facing.

Seemed out of place to me, but I don't lifelog. Possible it's all part of the Facebook featureset, could be that it's always running.

e3b7e9 () No. 9065874

Upfront disclaimer not a stegano expert, but willing to be another set of eyes on Q graphics to join the research. Ghidra too.

605726 () No. 9068395

Latest flag image:

Offset 0 (0x00):

File type: Portable Network Graphics image

Extension: png

MIME type: image/png

Offset 138 (0x8a):

File type: Zlib Deflate

Extension: zlib

MIME type: application/x-deflate

Offset 396 (0x18c):

File type: MPEG-3 audio

Extension: mp3

MIME type: audio/mpeg

Offset 5255 (0x1487):

File type: Zlib Deflate

Extension: zlib

MIME type: application/x-deflate

Offset 18864 (0x49b0):

File type: MPEG-3 audio

Extension: mp3

MIME type: audio/mpeg

Offset 24673 (0x6061):

File type: Zlib Deflate

Extension: zlib

MIME type: application/x-deflate

2a5bd7 () No. 9069769

https:// www.researchgate. net/post/Which_is_the_best_steganalysis_tool

e58177 () No. 9069792


>>There's two valid png blocks of which the first is the image. The second I have no idea what is.

That’s a zlib-encoded stream, PNG files use zlib to compress the image. It’s not anything.

2a5bd7 () No. 9069810


http://bugtraq-apps.com/ supposedly has a few good stegananalysis tools in it, but I am not running around with penguins and so I cannot DLstall it, so cannot say.

2a5bd7 () No. 9069848


… more steganalysis tools

2a5bd7 () No. 9069866


See esp. http://dde.binghamton.edu/download/feature_extractors/

2a5bd7 () No. 9069881


2a5bd7 () No. 9069893


Key paragraph:

"The steganalyst is usually something of a forensic statistician, and must start by reducing this set of data files (which is often quite large; in many cases, it may be the entire set of files on a computer) to the subset most likely to have been altered. "

2a5bd7 () No. 9069923


See also: https://en.wikipedia.org/wiki/Steganography_tools … although the author uses "encrypt" to mean "conceal steganographically", even though it isn't a synonym.

2a5bd7 () No. 9069944


The meat of the article (for the purposes of Anons working on this board) is: https://en.wikipedia.org/wiki/Steganography_tools#Tools_comparison

2a5bd7 () No. 9070001

More tools:

Digital Invisible Ink Toolkit – http://diit.sourceforge.net/

"StegSecret. A simple steganalysis tool" – http://stegsecret.sourceforge.net/

"Virtual Steganographic Laboratory for Digital Images (VSL) - Free tool for steganography and steganalysis" – http://vsl.sourceforge.net/

a28a3c () No. 9070231


Hmmm. While this is a true statement it is not necessary true for all apps. Take for example GEO location, facial recognition, voice recognition, iris tracking, finger print, sentance structure and language usage. etc…. There are all ways to correlate who you are, who you are communicating with, where you are, where you go, and what you are thinking about and create a dynamic profile. Notice recently that Scroogle and other companies stopped using cookies? Why? Because they don't need them any more for tracking. This tech is very advanced. They are using other techniques to identify you on your devices. While command and control (if well designed and thought out) does behave in this manor you are suggesting. There are many many layers and many many techniques as to how personal data / life is now compromised. Ghidra is very good at what it does. However extending your tool kits to steganography hide and seek tools, malware analysis checkers etc are very important as you do your detective work. There are many clues that can be discovered with Ghidra. Some can be easily missed. I just found an exe that was zipped up in an img file. I didn't see the exe in Ghidra (it was hidden very well) but I did find the bread crumbs for the zip file. Once I found the exe I put it back into Ghidra to see whats up…another layer of hidden information. Still working on that one particular challenge. I am always working to expand my tool kits and sharing what I know. If other anons have go to apps they like for this work it would be great to see what tools you use and the process you use for de compiling. It will take a digital army of anons to clean up all the compromised phone apps, PC, and Mac software. Now that we are on our way to cleaning up the compromised MSM "system" now its time to rip apart the web and its applications. Its disgusting what it has become. I love technology, been working in this area of tech for many years. I have watched brilliant technology get used for corruption fo way too long. Its time for this behavior to stop and make Technology Great Again. Our industry must be saved from what it has become. Surveillance is at an all time high right now. Chinese tech has subverted everything technical from the inside of or apps out. (Its a pervasive pattern in fact its right out of their playbook. Look up the book Unrestricted Warfare if interested). There are so many craptastic applications and services we all really need to get our shit together and fix these problems. Its a matter of national security when you think about how many chip sets we have in our homes, and businesses. They are all compromised in one way or another. Its shocking actually.

….Hack the planet anons. Lets roll!!

2a5bd7 () No. 9070244



DIIT: https://sourceforge.net/projects/diit/files/diit/1.5/diit-1.5.jar/download?use_mirror=gigenet … from:


<Documentation (incl. FAQs):


StegSecret: http://stegsecret.sourceforge.net/


<Documentation & examples:

http://stegsecret.sourceforge.net/SpanishManual.pdf … sorry, no habla Inglez


VSL: - https://sourceforge.net/projects/vsl/files/vsl/vsl-1.1/vsl-1.1.zip/download


Forczmański, P., and Węgrzyn, M. Open Virtual Steganographic Laboratory, International Conference on Advanced Computer Systems, ACS-AISBIS 2009.

Forczmański, P., and Węgrzyn, M. Virtual Steganographic Laboratory for Digital Images. In Information Systems Architecture and Technology:

Information Systems and Computer Communication Networks (Wrocław, Polska, 2008), pp. 163–174.



65d3fb () No. 9070428

bbb1289aec0330....webm (1475 KB, 255 x 191, 640 : 480, C_C_Generals_H....webm) (h)


Bingo!!! I see many useful Target for GHIDRA.

* Various Covid Tracking app fro different country.

* Tesla app

And The Windows Driver for this Chinese Chinese laptop…..

HUAWEI HONOR MagicBook Pro 2019


This Laptop come pre-installed with Deepin Linux. It is the only Linux Distro That can be installed. And if you decide to install windows 10 on it. It will boot. But it will work like crap until you install the Driver from HUAWEI. I guarantee that the driver are full of Backdoor that lead directly to the CCP surveillance apparatus. So if a NSA spook would like to have some fun……….

2a5bd7 () No. 9070452


That's not quite true.

Here's the returned URL for a Goolag search for "whatever", which is so effing long I have parsed it at every ampersand, as &amp; seems to be the field delimiter:

This is their domain: https://www.google.com/search?source=hp&

This is basically an in-link cookie: ei=CYe0XveWHoyStQXJ4JToBg&

This is my search string: q=whatever&

This is my original search string, so they can track refinements I make(*): oq=whatever&

This is, I think their attempt to geolocate my ass(**): gs_lcp=CgZwc3ktYWIQAzICCAAyAggAMgIIADICCAAyAggAMgIIADICCAAyAggAMgUIABCDATICCABQpw1YnxVg2x5oAHAAeACAAZgBiAHfB5IBAzMuNpgBAKABAaoBB2d3cy13aXqwAQA&

I haven't a fucking clue: sclient=psy-ab&

Who the fuck knows: ved=0ahUKEwi3v4KM4qLpAhUMSa0KHUkwBW0Q4dUDCAg&

No fucking idea: uact=5

(*): This is one of the ways they train their neural networks, for free – your work (our work, collectively), but "their" IP.

Terms of Service, my ass.

(**): It can only go to Internet nodes of a certain rank – the building in your neighborhood that houses your ISP's boxes.

2a5bd7 () No. 9070481

8dc22edc9a81fa....jpg (4 KB, 94 x 83, 94 : 83, 20150504_EOD.jpg) (h)

2b8d14b99c7901....png (19 KB, 255 x 43, 590 : 99, Hello_to_PRC_C....png) (h)

2a5bd7 () No. 9070498

2a5bd7 () No. 9070511


Sorry – mousefart.

25121b () No. 9070567

Transcripts released


Can anything be found in these pdfs?

2a5bd7 () No. 9070614

GitHub - https://github.com/ragibson/Steganography

Sales pitch: Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files,

and byte sequences. Simple LSB Steganalysis (LSB extraction) for bitmap images.

2a5bd7 () No. 9070684

7e98716d5402ec....png (42 KB, 255 x 179, 937 : 656, StegDetect_gra....png) (h)

2a5bd7 () No. 9070973


43cf29 () No. 9071116

"strings -10 [imagefile]" may lead to something. Linux.

2a5bd7 () No. 9071140


2a5bd7 () No. 9071173


adcfe1 () No. 9071370


non-rendering pdf pages = pdf templates and/or layers. requires pdf javascript and Acrobat Professional

a28a3c () No. 9071733


The short answer is yes it is possible.

There are a few tools out there for decode. I had one at one time on my system I was looking at but can't remember the name. If you dig on PDF Steganography decoders you should find it….

40dd42 () No. 9072020


L-Serine is indeed a cerebral protein. Interesting paper.

f9e419 () No. 9072526


You're in luck, i just happen to be an Acrobat Professional. I spent 6 years with the circus

2a5bd7 () No. 9072636

2f5f3f1584ef1c....png (2 KB, 255 x 134, 310 : 163, American_Flag_....png) (h)

f768deaef22da9....png (29 KB, 255 x 134, 1280 : 674, American_Flag_....png) (h)

f768deaef22da9....png (29 KB, 255 x 134, 1280 : 674, American_Flag_....png) (h)

274534d7d17802....png (23 KB, 255 x 134, 1280 : 674, American_Flag_....png) (h)

f768deaef22da9....png (29 KB, 255 x 134, 1280 : 674, American_Flag_....png) (h)

OK, so … I was reading various things about how to identify candidate files for steganalysis,

and some of what I read said, good luck: no algorithm, no key, no can-do.

But other things said: well, what are your candidate files? Don't you have traffic analysis or

other hints that there might be steganography in play? Get a bunch of these files, and do a

statistical analysis of the data and metadata, and see what you find – maybe that will give

you clues about who, how, and what key, blah, blah, blah.

So – here's the deal: Q & Q+ are obviously operating under all kinds of hard legal, constitutional,

strategic, tactical and other constraints – but, if I thought they were just fucking with us and

nothing else, I wouldn't be here at all. So, I made the guess that they would hide things (plausible

deniability, parallel construction, blah, blah), but not bury them so deep that we couldn't find them.

Which means, therewillbe clues. Like what? Anon thinks and thinks and realizes: recurring files.

So, I went back through a bunch of Q Drops that had "the same" image files – here are some attached;

Why should the flag from #3908 be a smaller file-size than the others, when they "are the same image",

and all have "the same dimensions".

This hinted that, yes, there is something there. So I did the laziest of steganalysis possible: you open

the supposed image file as a .txt file (use a simple text editor like MSFT's notepad.exe), and just look.

So I did. The internal 1s & 0s of these files are completely different from each other! Go look yourselves.

"Same image file", my @$$.

If there isn't stegano in there, then I don't know what else could explain this. So, fellow anons: please

look inside these, and suggest steganalytic lines of attack based on what you see, or think you see.

How do we identify and extract?

There are other "recurring" image file series also: I am looking at some of them and will report back.

This is either garbage or gold – let's dig & find out!

dffc81 () No. 9072714

For those completely confused about Ghidra…

I've bee pouring through the tutorial included in the download and it looks like Ghidra is a tool for reverse engineering complied computer code. If you don't have a background in programming… and a pretty good one… it will most likely be a complete waste of time for you.

I haven't found a way to "inspect images" for hidden messages. If I'm wrong, please tell me how stupid I am. Show no mercy.

2a5bd7 () No. 9072737


There's a sixth one @ QDrop #4140 – I tried to post it here, but was told it was already in the thread (where?)

Note that #2790 has smaller dimensions – it's the other ones (incl. #4140) that have "the same dimensions", but different binary guts.

Surface: all six are the same.

Guts: totally different.

Take a look at each in notepad.exe and compare – now what?

2a5bd7 () No. 9072789


Ghidra, as other anons here have suggested, may be intended for us to use

to "out" spyware embedded in, say, Coronavirus-tracking "public health" apps

for smart phones, and other "gifts" from Bill Gates, WHO, and others.

I doubt Q intended us to use it for steganalysis – but I am also sure that we

are supposed to do steganalysis, …

which is why I posted all those links to misc. steganalytic tools, … not a single

one of which I know how to use … yet.

So, if steganalysis of images in Q Drops interests you – check out some of the other

posts here (above) for possible tools, and dig in.

e58177 () No. 9072945

f1184d229fd645....jpeg (103 KB, 184 x 255, 753 : 1045, E2EF6A87_C7D1_....jpeg) (h)

87d456b8084328....jpeg (603 KB, 153 x 255, 1128 : 1874, 465FF5C2_7CE8_....jpeg) (h)


For the 8051 CPU, the PC memory register has RAM pointers: R0, R1, etc. What you’re seeing is simply the memory map for these register arrays (banks).

In the Ghidra code you can see these register arrays mapped to specific addresses (BANK_R0 maps to INTMEM:00). So INTMEM:00 thru INTMEM:07 are assigned to register bank 1.

The result you got by Googling "INTMEM:00-INTMEM:07" was not because of any secret code you found in the image.

Test this:

Download any random jpg from the Internet and open it in Ghidra using the language 8051 Archimedes 16 bit Big and you will see the same thing.

44ddbe () No. 9073052




Guys, not a coder or anything else but want to let you know something that might/might not be useful.

My phone has been getting hacked a lot when I'm on twatter posting for the team, and occasionally when I'm on /qr/.

By hacked, I mean I try to type text in a reply and something takes over and starts typing seemingly random shit. I can't stop it from happening, but it quits after a few minutes and doesn't come back.

What is typed looks A LOT like brainfuck string, except if you're looking for particular letters think upper and lower case letters Q and A and the number 1.

The string looks like that except with those differences. Never any other numbers or letters. Just those.

Dunno if it means anything or is helpful, I hope that it is. Just saw the discussion and that immediately registered. Thanks for all your hard work!

e58177 () No. 9073375


The way you’d go about incorporating Ghidra into Steganalysis is by first using the various tools to inspect the image for hidden files. Binwalk is good for this.

If you find a hidden file you have to extract it using binwalk. Then you open that file in Ghidra to see what it does. You’ll have to figure out which CPU language it needs but you can try various platforms, or hopefully we’ll be given some direction.

Reverse engineering is not for the faint of heart.

Thus far I have not found any hidden files or text in the more recent images as of yet.

3443a3 () No. 9073717


What a post, anon. Many thanks.

3fe71e () No. 9073851

69d39c97b8d7b1....jpg (6 KB, 255 x 143, 300 : 168, Unknown.jpg) (h)

c52850dabc9c36....png (441 KB, 204 x 255, 890 : 1110, Screen_Shot_20....png) (h)

04895f36fb38ab....png (96 KB, 202 x 255, 607 : 768, Screen_Shot_20....png) (h)

3f802d6c6b07bd....jpg (144 KB, 255 x 168, 456 : 300, Screen_Shot_20....jpg) (h)



Your brainfuck string is the quantization tables for the image. It is related to the compression of the jpeg image.

That said, it is possible to use the quantization table to hide data, the space available severely limits the quantity of data that can be embedded.

3c15f1 () No. 9073921

The issue with stego in Q drops that is all the images are too small to really store much data. It also doesn't fit with what's been going on here to expect to find some secret leak or something linking us to some off site file drop. I feel like if we are to find anything hidden in the images it will be a simple message like "Bring on the PAIN" or "WWG1WGA", where the message itself isn't so much the drop, but the method we used to find it is. It'll probably be something trolly that not only shows us how they communicated in plain sight, but also taunts them that Q team knows everything that they've said.

f25184 () No. 9074092

Anyone pulling apart the games? I'm just starting working on Star Wars Commander, Windows platform.

I am looking for unusual functions that might be described as 'easter eggs' which might open backchannel comms. 'Cheat' interfaces.

If anyone else is honchoing this particular operation, point me at 'em.

Otherwise I would suggest, let's pull apart each platform of this app because it was called out specifically by Q, and we can move onto others

0b7156 () No. 9074438

Be sure to drink your Ovaltine

62f144 () No. 9074616

I'm doing the same thing with one of the PDF's that the Schiff just dropped to see if I can come up with anything.

So far no dice, but I'm also fairly new at reverse-engineering and Ghidra, so it's possible I'm missing things.

Having said that, I am glad OP put this board up for Ghidra hunting, and I think we may be focusing too much on his images and trying to decode the hidden meaning in them. There may very well be more there 'than we know,' but we shouldn't forget to tear new things apart too.

Anyway, glad to be here. Thanks for the board OP.

62f144 () No. 9074669


Is Star Wars Commander even available for download anymore?

62f144 () No. 9074898


Well I made myself look like an ass. I replied to the wrong guy with a question I easily answered by a quick search.

So from what I can tell I don't think you can download Star Wars: Commander from official sources anymore. However, I was able to find the Android apk file for download from:


43cf29 () No. 9074901

Not sure if this helps:


43cf29 () No. 9074910

Not sure if this helps.


96d63c () No. 9075755

NaturalMotionGames Ltd

Pulled from all the stores early.

Could only find the APK if anyone is interested. Ghidra batch import worked. There are 15 embedded files.


62f144 () No. 9077094

Just occurred to me:


In this drop, Q asks us "Rebellion or Empire?"

Now, I've never played Star Wars: Commander before, but I could probably see this being a question on account creation. If we crack this apk open with Ghidra and take a look at where that screen/text is, maybe there's something there?

I'm starting to look through it now, but I likely wont be able to really dig into it until later today. I just wanted to share this idea in the meantime if someone else thinks it may be a good place to start.

96d63c () No. 9078415


Neither have I played this game but I agree it is worth diving into. Given that Q mentioned Ghidra and then re-posted an Anon saying it is something to mess around with sounds like a direction.

From what I read in previous posts, others mentioned some thinks I was thinking too..that it is interesting he posted the flag in particular 6 times and that maybe even the file name has some relevance.

62f144 () No. 9079983

e3dd9726220c91....png (2693 KB, 255 x 148, 2248 : 1305, Empire_or_Rebe....png) (h)

For you anons, another resource as I learn to go through this, myself:


It requires you to have an understanding of software/programming, but if you are like me (novice programmer) you should be able to understand it enough to jump on in.

One thing I found a lot easier to handle was unextracting all the files from the .apk first (linked above in other posts). You can do that with WinZip, and just place it in some random folder. I went too far down one rabbit hole and had the game running in an emulator, but I stopped after I got to the screen in the included image. I wanted to, at least, get to the screen we had mentioned that would have the option of joining the empire or the rebellion, and there it is.

So now I'm digging through the code a bit, trying to find out how the game runs (I've never programmed apps before so its new to me), but I think it runs out of the lib/(processor)/libmain.so file. I'm looking into the libunity.so file right now since its called out in the (I)Ljava/lang/String; line, but I'm not sure if I'm going down a rabbit hole again that I don't need to.

Anyway, I'm learning a lot. I hope some of you other anons that are more experienced in this than I are on a better path.

2a5bd7 () No. 9081503


No they aren't:

(1) See >>9072636

(2) The data could be something as simple as a single, short sentence that tells us where to dig for something bigger – think bootstrapping.

564a3c () No. 9085813


I was thinking same about repetition of the flag, potentially having clues seems plausible. Q could have just said "great news everyone Flynn is free".

At first look, the file names displayed not necessarily matching actual is curious.

Why did Q bother changing the displayed file names to patriot phrases instead of just writing it normally in the body of the message?

Q2790 patriot phrase displayed, actual file name…


Q3080 patriot phrase displayed, actual file name…


Q3823 patriot phrase displayed, actual file name…


Q3908 a file name is displayed…


…but the actual file name is…


Why display the last flag's file name. Seems deliberate, but what kind of delta if any might be here?

Q3983 is just AMERICA


Q4140 is the only flag with an exact match between displayed and actual…


117af0 () No. 9086726


I was thinking the same thing. Soro's bought Blizzard. I think it would be worth digging into their games.

Also, it's long been said that China has built back doors into everything. You can reverse engineer software to find the vulnerabilities and back doors.

The other thing I was thinking is it might be worth to check out WeChat and Whatsapp. Zuckerberg made a major pivot in 2018 towards encrypted comms. His number one guy quit warning, specifically, it will allow child trafficking and terrorism to be impossible to track…. very cryptic.

62f144 () No. 9093749

I posted it already, but if you are looking to get into reverse-engineering App's (like android apps, such as Star Wars: Commander) I've put together a small list of resources. I'll also give my notes at the end since Q has told us to work together, essentially, in that one picture of people climbing a hill.


Virtual Environment


Operating System Suggestion (Ubuntu is user-friendly)


Star Wars: Commander App:






Jadx (helpful for this project and other android apps)


Tutorial for Basic App Reverse Programming (get the .ova in this tutorial and load it into VirtualBox, it's essentially loaded with what the tutorial goes through)


As a rule of thumb its much safer to run everything through the virtualbox, but if you want to all the above will also work/have options to work on an average Windows machine. I wouldn't suggest it, but I can't say that I'm above just running it all on my computer anyway. I'll accept the risk.

Exploratory Notes

As a disclaimer, I'm very new to software engineering and I've never reverse-engineered anything before in my life. Having said that, I encourage anyone with an interest in this to try their hand. The more people we have on this the better.

So right off the bat, looking at the AndroidManifest.xml, it looks like this application runs like a normal app does with nothing nefarious that stands out. I'm not seeing anything out of the ordinary in the Manifest but I still have a loooooooooooooot of code to go through. I did notice that a few things can be activated by other apps/programs though:

FBUnityDeepLinkingActivity (fuck you FaceBook)





Only thought on this is that the Firebase messaging service seems to be able to activate even when the app is closed, but I don't think that in and of itself is abnormal or malicious, as apps should be able to do this (right?). Someone with more app development experience can tell me otherwise, but I'm going to move on.

The game runs on the Unity3d.player…

Lots of source code in Java to look through…

Boy, Facebook really likes our activity…

Nothing stands out. I'm going to take a look at the Native Libraries now and see if I can pry those apart. The 'native libraries' are the '.so' files, such as…


libbugsnag-unity.so (another bugsnag file, ho-hum)

libil2cpp.so (my God its huge [~30MB]. That's going to take forever!)


libunity.so (I haven't looked just yet, but I think this is the unity engine that the game runs in. Also my God its 19MB and is going to take forever)

Kind of getting hung up. I decompiled the libl2cpp.so with Ghidra and there's an awful lot to go through here, and it takes some in-depth analysis to do so. I'm thinking I need to hit the books a bit more before I start jumping into this because passively reading and hoping that something jumps out at me will be futile.

Any suggestions would be welcome.

62f144 () No. 9094189

Wait I just realized something.

Reading through some of the java code for the messaging service under:

Source Code>com>google>firebase>lib

I've realized that a lot of the messages sent back and forth aren't just stored at Google's cloud, but they SEEM to be also sent to FaceBook for tracking purposes.

This means that there are two separate locations that have stored that shady conversation we saw. And its not just message content, but user data as well (meaning it could be directly attributed to the sender).

I mean this isn't ground-shattering or anything, but it gives me some insight as to how Q and/or NSA could be catching these dudes.

798730 () No. 9094201


"luke lurks" too. ;)

There are a few images that have "non-displayable characters" in them.

Pull the keyword field from the metadata & see what it's encoding is??

You know I'm all about "it's in little pieceslike a puzzlethat we have to reassemble" (combine all the little "crumbs" of data into 1 file and that'll give us XYZ proof)

MANY Q pics (PNGs) will reveal a similar NDC string with stegano-red.

zsteg has spit out some interesting stuff, but I'm wearing of short string false positives like we talked about.

We've talked about IMAGE NAMES being important because Q (or the poster) can CHOOSE what they name the image before they upload it. This and the TIMESTAMP (to me) are the most important pieces of the posts (that don't have to do with the content of them–which truly could even just be "cover text" to conceal 'steganographic messages' utilizing timestamps and/or image names).

more to come!

798730 () No. 9094214


This may be why "even if you DELETE Facebook, it STILL tracks you!!"

(because you still have things on your phoneespecially if it's Androidthat utilize that Google libs)

798730 () No. 9094240


yes @ flags w/ diff names & sizes!

some are ~23 kb lol

Some are PNG, some are JPG.

I remember someone even mentioning that one of the flags had the WRONG number of STARS? (don't recall which or if this was verified though)

Another little "coincidence" is that the PAIN/Punisher pics always seem to come FIRST, and then shortly after, there'll be a FLAG pic.

PAIN = Operation?


896c3c () No. 9095843

798730 () No. 9099831



This is the SHA256 of the PNG above.


Grab all the flags, check MD5, SHA256, etc. and you can see what IS and IS NOT actually the same files.

6d5e4b () No. 9102319

Hi anons. Wondering if I could get a little help. Not a stenofag or a codefag. Totally useless. I used to pirate a lot of music and the folders always came with cover scans.

They've always been normal except the scans for this album. Instead of jpegs they're TIF files and they're fucking huge 68mb is the size of one. Ever since I downloaded it I wondered about the covers. Always suspected something hidden. Anyone wanna take a look?


82ce9d () No. 9103699


By its very nature its a tracking tool. Of course its going to have bullshit it that app. Think about the database correlation on the backend. They have had this technology for years. Its a COVID tracking app. A shiny new nickel to ride the same shit slide.

Think about it! Cause and effect.

They have always been tracking us with phones and apps. Now they are putting a different label on it

"Install this app to save lives" "For your family." "For humanity" "Be a hero install this app"….what a crock of shit. They are attempting to have you download bullshit and the sheep are willingly installing it on their phones. WILLINGLY By its very nature its comped. They call it a psyop for a reason BRO!

c3ada3 () No. 9104738

8150b6b59b8719....jpg (91 KB, 255 x 126, 1859 : 921, IMG_20200509_2....jpg) (h)

a3ac5939e067a4....jpg (1 KB, 250 x 17, 250 : 17, IMG_20200509_2....jpg) (h)

083c92f3c59470....jpg (26 KB, 255 x 152, 753 : 449, IMG_20200509_2....jpg) (h)

Weird how the back end system to Ghidra is visible when you scan for it. I would expect errors and to be blocked

97afe1 () No. 9114309


ec4333 () No. 9115305

ran this jpg through ghidra. got a SHA256 string


ran through youtube search.



At best 460 of (You)s found this already.

Seems this file has more data embedded, throughout. It's doing wierd shit on my first level look. Happy hunting, faggots.

Enjoy the show!

YouTube embed. Click thumbnail to play.

e58177 () No. 9117546


What language/cpu did you use? What was the SHA256 string?

ec4333 () No. 9117642


>What language/cpu did you use? What was the SHA256 string?

SHA2 string just under the jpg. on the post. i gotta believe the language/cpu set is machine dependent. that said, my project ran on powerpc.

a85e22 () No. 9118540


the name of the jpg in the drop is the SHA256 of the image.

you got the yt result bc the vid description lists the file name.

a55360 () No. 9120686

Checking in. Kind of set the Star Wars: Commander dig on the backburner since I'm not convinced that's the right rabbit hole to be jumping down. I heard someone mention that the redactions can be pulled off the Transcripts in Ghidra, but I'm not sure. The PDF's don't have any executable code in them, so Ghidra would really only show bytes in the documents.

Having said that, I loaded up two PDF's anyway just to take a cursory glance. I used Andrew Brown's transcript as an experiment, looking first at Schiff's release and then the DNI release.

Schiff's release looks about what I would expect a PDF to look like in Ghidra. Pretty mundane. I looked through the ASCII translation of the bytes and saw some XML formatting code, and I was able to differentiate when paragraphs start, but all-in-all there's nothing to see there.

The DNI's release is a bit more interesting though. I haven't found anything just yet, but it looks different from Schiff's. The ASCII readout is about the same with some differences (at first glance), but what stood out to me was that the code analyzer actually returned stuff. I'm not sure what it all means, but (as we knew) there's an obvious difference between the files that Schiff releases and the ones that the DNI released.


The DNI's version seems to be images as opposed to Schiff's, which could be close to the original PDF documents but with redactions. The DNI, it seems, did the smart thing by scanning these documents back in after redactions, removing the ability for the documents to be torn apart. I think it would be worth opening Schiff's documents up in Adobe Pro and seeing if you can't just simply erase the bars.

I will have to give this a shot. As always, I'm open to anyone else's opinions or direction on this. I'm very new to this but I'm dedicated. Also, if these redactions CAN be stripped, it'd be smart to download all of them before they get taken down.

76180a () No. 9121894



2c6622 () No. 9122082


Big maybe. I've had a few of the documents open and I haven't seen anything specifically that would effectively allow me to remove the redactions. Now, I'm not the smartest, maybe someone else here can do just that.

I've taken a look at Schiff's released files versus the DNI released files. I was right, the DNI essentially printed the pages and scanned them back in, so the redactions on those are permanent. Not much we can do about that.

Now Schiff, though… we may be able to recover the redactions there, because when you tear them apart with Adobe Pro you can move the black 'redacted' parts around. There's no text behind them in the field (or rather above them, the black boxes are on a layer behind the text boxes), but maybe I'll take another look at these in Ghidra…

If this is a possibility, I'd vote on digging into Schiff's released files.

f8082f () No. 9122398

cbf6dc4acc602f....png (48 KB, 255 x 87, 849 : 289, pdfToolz.png) (h)


any results?

just saw

>>9122180 (ob)

>>9121987 (ob)


for searching pdf files for hidden bits this might be the tools you need

my 2¢

699848 () No. 9122598


Good pointers., using SHA256 of the image. So probably nothing in that context. But perhaps there are clues in the images. I wonder if others think the repetition of images would indicate a pattern worth identifying, or, maybe Q is merely using them to reinforce events, e.g. use a flag when it is a patriotic win, use Obama's 'renegade' when they have evidence against him, etc.

1ff91f () No. 9122779


This is what i found, isn't related to ghidra but it could help.


a55360 () No. 9125009


Okay so PDF's are essentially heaps of code that Adobe Viewer/Acrobat translate into readable text. There are some nuances to it, but you can read a few articles here to get a good idea of how a PDF is built:


Here's where I'm at. PDF files will declare objects that will be present when opened in Adobe. Those objects can be a number of things (text, images, signatures, etc), but the problem is that the actual contents of those objects are encoded. Luckily for us, we know what it uses to encode:


So I'm still learning a bit more about that, but conceptually one would be able to grab the bytes from the objects in Ghidra and run them through a Decoder (using the… FlateDecoder algorithm?). What this would do is essentially display the encoded object as plaintext. In the event that the object is a picture it'd look like jumbled plaintext, but if it were a text box it may have some code describing the box, and then possibly the string inside.

I haven't tried it yet. I'm having to learn about decoding first. I'm trying to figure out if there's a way for me to decode straight from binary or hex through the algorithm into plaintext, or if I'm just barking up the wrong tree again.

78c6ef () No. 9125184

Has anyone figured out the Legend to the entire Q Crumb Map?

Can Ghidra analyze something like qmap.pub?

provide an overview (40,000ft)?

94e2ff () No. 9138660


Thanks for the explanation >>9072945

b58790 () No. 9138696

6b60c5ea1ca4b8....png (177 KB, 255 x 144, 728 : 410, ClipboardImage.png) (h)



PUNISHER IMAGE YET? I was up with my dog who was having seizures. Besides, I still have a flip phone.

aea24e () No. 9144066


Novice anon here…I’m finding symbols in Q’s images. I have been doing symbol counts…& looking back at corresponding drop #s. That one is 428. Idk if I’m on the right path? Haven’t seen anons saying this…thoughts?

aea24e () No. 9144105


Also, drop pic boom time baker is 64-which really reference the pic. That’s what made me think I might be onto something.

bb9940 () No. 9145517

All of these people pushing ghidra as a steg tool seem to forget that Q already provided us with a steg tool long ago.

87d248 () No. 9145994

What you all are doing here is interesting. I Only understand a little tiny bit of any of this but still like seeing what you find. The only thing I have to offer is some old knowledge that may or may not be useful. Many govt systems, especially legacy ones use the language COBOL. Sometimes PASCAL and FORTRAN were also used. I know those aren’t as common anymore but don’t forget about them.

fe58d6 () No. 9148162


Yeah I think the pascal is usually used as an embed in ada though.

a53a08 () No. 9148279

12167e76fab5e4....jpg (198 KB, 255 x 178, 1500 : 1046, EXqizg6WkAEnQ2G.jpg) (h)

So I have yet to install ghidra, but I took a look at some of the photos on Obama's tweets and ran some segments through an online brainfuck editor here's what I found. Is it normal for jpgs to have this?

>options passed to editor

Cell size (Bits): 8 16 32

Dynamic (infinite) Memory:

Memory size:


Memory overflow behaviour:

undefined (fast) wrap abort

End of input: no change char:


Dump Memory at char:


Count instructions


ø.Id›¶Òî %A^z–³Ïì &Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eŠ¯Õú Ek‘·Ý*QwžÅì;cŠ²Ú*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#

#8#f#”#Â#ð$$M$|$«$Ú% %8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(

(?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×- -A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3



Syntax error: Unexpected closing bracket in line 4 char 445.

'use strict';var _,o=[],c=0,p=0,j=0,i=[],m=new Uint8Array(30000);function q(i){self.postMessage({o:[i]})}q(m[p]);m[p+1]+=5;i.length&&(m[p+1]=i.pop());i.length&&(m[p+1]=i.pop());i.length&&(m[p+1]=i.pop());i.length&&(m[p+1]=i.pop());i.length&&(m[p+1]=i.pop());m[p+1]-=5;q(m[p+1]);q(m[p+1]);q(m[p+1]);q(m[p+1]);q(m[p+1]);m[p+1]++;return self.postMessage({s:-1,o:o,c:c,m:m,p:p+1,n:-1});

a53a08 () No. 9148379


nevermind, I was using the editor incorrectly

a53a08 () No. 9148606

433e893ee7e0d3....gif (16 KB, 143 x 143, 143 : 143, helloworld1_11.gif) (h)

632e945703800d....png (0 KB, 150 x 145, 150 : 145, Piet_hello_big.png) (h)


brainfuck-esoteric programming language in the quantization table




obscure color information in punisher pic

it might be another esoteric language - piet


e58177 () No. 9149955


I ran some of the House pdf’s through various pdf forensic tools and even Ghidra (and ran the embedded jpgs through forensic tools) and got nothing revealing. I did not see a way to view redacted data.

I also haven’t found anything in the flag or skull images, but I haven’t looked at the most recent red skull, it’s on my todo list. These are better suited for image forensic tools but also threw them into Ghidra but saw nothing.

I’m guessing Ghidra is meant for the Star Wars game or a future file or app.

e79ecb () No. 9150018


Not sure if this is anything yet. Still poking around. I work with a ton of different stego tools and scripts as I attempt to detect patterns. The other night I was using StegoDetect and StegoLSB (python stego tools family) with the recent flag image and the punisher_red image which appears to be identical to the original Q-posted (BTW).

I was getting strange results playing with the LSB number 2. The file was reporting incorrect sizes due to bit decision. Typically defaults to 2 when playing with LSB. I changed it to 17 for fun and got interesting results. Still working to figure out the file type signatures it produced…but just wanted to throw this out to the group in case you are playing with these types of tools. Here are the command lines I was using on the files.

stegolsb steglsb -r -i flag.png -o output_file. -n 2


stegolsb steglsb -r -i flag.png -o output_file -n 17

f2c621 () No. 9151220


Pixel Knot? Yes it is one of many tools for exchanging secret information. Steghide is another….there are many. Wav and mp4 files etc… The key thing that Q did state is "'tools' All of these tools work together to find the surveillance challenges'' and hidden information etc…

Its really no different from digging in the web. All anons are actually wired for this type of forensic work. By our very observation, autism OCD, ADD nature.

Ghidra can do many things. It can decode many files types, different platforms, chip sets, controllers. Its a primary tool for decoding executable files, and code with internal functions. I have dug into images, PDFs and other file types. Just to look and see whats going on from a particular angle. With a similar tool I will look again from another angle. Its one of many tools that can be utilized. It is however extremely powerful. The thing is… we need all the tools we can get as we identify the security holes in most of the products we use every day. Phones / PCs, CPUs, routers, chip sets, software and apps. China has produced almost everything tech in the US and guess who we are in a silent war with right now…. It will take an army of anons to dig into the compromised digital universe. I encourage every anon out there with skills or no skills to start digging into our technology.

e58177 () No. 9151706


“Toolkits can be helpful.”

Ghidra is just one of many tools for digital forensics. You are right that we need to be thinking beyond just one tool.

4948e6 () No. 9155724

fe386bc3ae81b1....png (3222 KB, 182 x 255, 1250 : 1748, ClipboardImage.png) (h)

I've got an image for you to play around with


Looks photoshopped. All albums look face. his face looks odd.

4948e6 () No. 9155845

464c725dfc7c8f....png (399 KB, 255 x 76, 1424 : 424, ClipboardImage.png) (h)


Ran it through hexdump and got this:

0000f1b0 26 94 bd 5c 08 22 d2 26 96 ff 00 c4 70 cb 1b e5 |&..\.".&....p...|
0000f1c0 e2 22 ed 77 e4 a9 5c 60 39 55 ea 57 79 9c 0e 09 |.".w..\`9U.Wy...|
0000f1d0 a1 f1 2c 8a 0a d6 1f 03 ea 67 0a e5 e0 fe d0 b8 |..,......g......|
0000f1e0 b6 d8 e0 7f dc ca 31 bc 32 b4 cf 98 fe c1 05 c2 |......1.2.......|
0000f1f0 db 9f 13 31 8c 82 5a 8f 3a ac 47 40 4e ce 1b b8 |...1..Z.:[email protected].|
0000f200 bc 10 46 cb 01 bf 98 60 c1 63 6e d1 e2 0b 62 d0 |..F....`.cn...b.|
0000f210 0b 56 c3 d3 29 29 c3 16 ef 11 e9 98 10 70 1d a2 |.V..)).......p..|
0000f220 09 3b 4c 1e d1 93 2c a7 a7 fc 4a 63 6e 47 4b ee |.;L...,...JcnGK.|
0000f230 1f 52 94 55 d2 6e bc 5c ff d9 |.R.U.n.\..|

40dd42 () No. 9156296



My b, apparently this is a meme


But the album name is probably the comms. (Hotter than July). Q said, spring summer would be HOT

40dd42 () No. 9179608

well fuck right off


c012ff () No. 9184158


I think I remember it being used to condense code and formulas or calculations because back in the day everything had to be done to save space on the system. Different than now. That is probably what you said but I don’t know much of the lingo.

bb460a () No. 9209405

723e8750881936....png (563 KB, 144 x 255, 640 : 1136, C1BFCD25_A7B1_....png) (h)

bb9a0f09fe53aa....png (225 KB, 144 x 255, 640 : 1136, 619EF8C1_194D_....png) (h)

711ff50203493d....png (189 KB, 144 x 255, 640 : 1136, CCF78ED0_0D3F_....png) (h)

3a4df36241f2aa....png (296 KB, 144 x 255, 640 : 1136, 068416A5_7EAF_....png) (h)

0a60fefb2443f1....png (326 KB, 144 x 255, 640 : 1136, 7FA1A687_0CF4_....png) (h)

For making your internal problems the problem of the rest of the world

And saying or doing nothing

Julian Assange made the game multidimensional and Trump betrayed him.

Black comedy, yes. Lol

And yes, yours truly owes Julian a massive thank you.

And no, i’m not perfect either, but some of my knowledge is.

Big love to Julian.

A combination of high level information warfare based on Gregory Bateson’s ‘theory of types’ , Lots of meditation and some incredible luck.

Seven weeks meditation with these bad boys.


And yes, it is all over 8kun too.

Illumination route (27 pages)


Methodology (37 pages)


You’ve been duped by all your politicians and twitter too. Who collectively thought 💭 it would be a wise move to conceal, threaten and judge the true source of the storm ☔️.

Don’t take it personally. All our politicians are shameless cunts. It doesn’t take a genius to figure that out, does it?

And fixating on national identity is a recipe for disaster.

And yes, we are definitely all created equal.

And the dumb Jews do pay a price to handle the money too. Lol 😂


Direct link to source document in pdf format. 2,238 pages 

17 year long beam of light from the absolute. 130 Mb

Every single entry date and time stamped.


Kills the poor hurt feelings and opinions of individual humans dead.

Jon James Pratt (999)

49 year old illuminated polymath from Warwickshire

Humbly blessed as the world’s top intellectual and philosopher

Never lies and is never violent. Ever

Aka 'the storm ☔️'

Aka ‘cosmic lol 😂’




Emergency backup drive




Vile celebrity and money worshipping morons that have never had permission to kill, ever.

bb460a () No. 9209410

ce99a092660e65....png (286 KB, 144 x 255, 640 : 1136, 3EABEEED_170C_....png) (h)

6bf89ade10bb02....png (99 KB, 144 x 255, 640 : 1136, 76CFB05D_E198_....png) (h)

8e2a51c882c069....png (104 KB, 144 x 255, 640 : 1136, 5E25F129_65CE_....png) (h)

2375f1cfe012da....png (106 KB, 144 x 255, 640 : 1136, 486FDD5C_29D9_....png) (h)

fbefeb7c4ed873....png (98 KB, 144 x 255, 640 : 1136, 5F6535E5_5C95_....png) (h)

bb460a () No. 9209416

fa2f731cc7b563....png (146 KB, 144 x 255, 640 : 1136, C09BEA44_E8CA_....png) (h)

871609b93f953a....png (197 KB, 144 x 255, 640 : 1136, 3DEDBF6C_C19C_....png) (h)

aa037539387ffe....png (128 KB, 144 x 255, 640 : 1136, 38A81DB6_B647_....png) (h)

1a986eb7834680....png (326 KB, 144 x 255, 640 : 1136, 2B5D7399_5B77_....png) (h)

2ff98701e1af8f....png (65 KB, 144 x 255, 640 : 1136, 71AA9926_6D6E_....png) (h)


Who are going to be crucified live on tv

bb460a () No. 9209421

48fa5ddb306822....png (296 KB, 144 x 255, 640 : 1136, 92FD3497_6229_....png) (h)

4f4c4f3cf81835....png (663 KB, 144 x 255, 640 : 1136, A448D3F9_E245_....png) (h)

c518b0760aee65....png (189 KB, 144 x 255, 640 : 1136, 4C96D04C_4696_....png) (h)

372f45865f5048....png (77 KB, 255 x 144, 1136 : 640, 2F8A57E4_7313_....png) (h)

cd22e32c16ea0b....png (68 KB, 255 x 144, 1136 : 640, C1E2F041_758A_....png) (h)


Putting yourself Above 7,7bn people.

You’re a traitor to America and humanity

Instant death sentence

bb460a () No. 9209423


Or you will be nailing your whole fucking family first

bb460a () No. 9209428

957928cb6e9402....png (177 KB, 144 x 255, 640 : 1136, E015C486_DC14_....png) (h)

43aedc85d904ff....png (421 KB, 255 x 144, 1136 : 640, FA28E514_2ECF_....png) (h)

a09d0f0783e21c....png (293 KB, 144 x 255, 640 : 1136, A1B08B19_751E_....png) (h)

9c985f69802bec....png (343 KB, 144 x 255, 640 : 1136, DB611936_4F63_....png) (h)

e87afa8b9a389a....png (448 KB, 144 x 255, 640 : 1136, F234E7D2_1B2C_....png) (h)

bb460a () No. 9209434

bb460a () No. 9209441


You personally have put 7,7bn people in quarantine

Be truthful anons.

Here come the mandatory vaccines too.

Tbh I never thought Americans were this stupid.

Brits definitely.

Doesn’t take a genius to figure out who is telling the truth here, does it?

Yet so many of you are still on twitter, pushing the deceitful claim that Donald Trump is anointed by God Almighty himself.

He isn’t. And never will be.

And by refusing to acknowledge the real source of the storm, your dopey disrespectful president has not only betrayed the American people, but God Almighty too.

The royals here will have to give up the two old cunts at the top too.

Or it will be the whole family.

Zero negotiations or deals.

And Bibi is absolutely ruined too.

All of you chose to run the gauntlet.

And all of you have allowed this situation (killer virus and impending martial law) because all of you have put being American above being human.

Be truthful Americans.

Those 500 or so members of Congress are some of the biggest cunts in the world, and have betrayed all of you.

And by the mass media (((twitter))) framing a global holy war as an essentially American affair, highly polarised too, you have all been screwed by an essentially Jewish media.

The special talent of yours truly is to reduce the whole global power structure to a beam of light.

And that’s what the big pdf is..

And no, I’m not a prophet like Jesus (777), I’m God Almighty manifest in a human being. (999)

That’s why I’m completely separated from my knowledge.

The big 2,238 page pdf

Just two rituals hold the whole global power structure in place.

Divine in design, obviously.

The original mandate for 11.11.18

(The shot heard around the world)

Obviously scrubbed from (((twitter))) now.

Was for yours truly to align the Commonwealth with Russia, USA and Israel. (90% of the world’s nuclear weapons) (the ‘winners’)

Dawkins and Hillary as the offering.

A return to nation states too.

With the kings and Queens being the losers.

And Israel being both the winner (Bibi) and the loser (mass media) .

With the prize being world peace and the knowledge of other worlds.

The eternal life mentioned in the bible. Yes.

But instead, as a direct consequence of playing at online light workers, the vile and deceitful cunts here, with the undying assistance of two violent and deceitful geriatrics (parents) thought it was without consequences to lock yours truly up for 3 weeks, then 7 weeks, force feed him medication and leave an extremely fit and tough (violently abused as a child) 48 year old former professional Bmx freestyler with a broken back, a heavily lacerated stomach and prone to shakes and fainting fits.

If you are so blind to not see the truth when it is staring you in the face Americans, then you deserve to be locked up and forcibly vaccinated by your politicians..

Because that is exactly what is going to happen if you continue the charade on twitter.

You will all get further and further away from the truth.

Knowingly too.

That’s what makes it worse.

You see, I may have been born in England, but I had to relinquish my nationality when I was given a guided tour around 13 pizza ovens on the 1st January 2017.

The real pizzagate. Yes.

These politicians represent none of you, America, and never have done. Ever.

But because it was deemed more important to fake an American holy war rather than acknowledge the real winner in the global holy war, Team Israel, Team USA and team Britain have already dug a hole for themselves, that they will never get out of.

Sure many of you feel cheated.

You’re not the only one.

And yes, I have been to America many times, have many cousins there, been to Georgia, Alabama, North Carolina, Florida and California.

Always had an amazing time. Been for bmx competitions too. Been in the Appalachian mountains and south central LA too. Eaten cold beans out of a boat on the swamp. You get the picture.

And no, i’m not perfect either, but some of my knowledge is.


Direct link to source document in pdf format. 2,238 pages 

17 year long beam of light from the absolute. 130 Mb

Every single entry date and time stamped.


Kills the poor hurt feelings and opinions of individual humans dead.

Jon James Pratt (999)

49 year old illuminated polymath from Warwickshire

Humbly blessed as the world’s top intellectual and philosopher

Never lies and is never violent. Ever

Aka 'the storm ☔️'

Aka ‘cosmic lol 😂’


bb460a () No. 9209456

268f0495f110a3....png (387 KB, 144 x 255, 640 : 1136, D81D53F9_DE60_....png) (h)

2d8ddccfe9dd1a....png (750 KB, 144 x 255, 640 : 1136, 4E116093_04E9_....png) (h)

0cdce42a008a35....png (1242 KB, 255 x 144, 1136 : 640, 7D874476_7D0B_....png) (h)

82ecc373f60cf1....png (53 KB, 255 x 144, 1136 : 640, D0E2943E_C17B_....png) (h)

bb6bbb5421f861....png (394 KB, 144 x 255, 640 : 1136, B3FE778E_DDDE_....png) (h)

bb460a () No. 9209463


Hammer and nails for you

Live on tv

For the whole world to see

bb460a () No. 9209534

We’ll burn the whole fucking lot of them

a16e89 () No. 9209698


you dont know, but I believe.its open sourced so any backdoors, rootskits etc would be easy to find in the code.

Also, I installed blackarch on a flash drive and Ghirdra comes.stock with it. just use a vm or flash drive or if yr really paranoid a 100 dollar powerbook with no personal info.on.it

b0e462 () No. 9215525


Or you could go with something like QubesOS and setup disposable VMs. / sandboxes. Very handy tool when playing with malware and other apps you don't trust. Very easy to contain using template OS installations of ghidra. You can have multiple projects isolated and contained running concurrently. With the separation of network interfaces you can also setup local networks that don't connect to the web and "watch" the behavior of a given app by setting up network monitoring and watch what resources the app may attempt to contact. Very handy environment for this type of work.

a8c12f () No. 9235782


Sorry if this has been asked, coding and such is a bit out of my wheelhouse. Has anyone ran the background "music" in this video through a spectrum analyzer to look for images or other data? It sounds like there might be something in there.

a8c12f () No. 9235791


may want to try that on the recent Snowden related drops.

6507eb () No. 9245114

92ea160f5ee4b4....png (239 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

20115212abe7e2....png (213 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

b1696df242cf39....png (205 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

c5e9e253c64018....png (163 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

d4c8b7af2f0698....png (200 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)


Not sure how to read code very well ….

6507eb () No. 9245175

a470bdacca5e75....png (159 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

568615ba6d73c5....png (220 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

6009be94f230c0....png (223 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

6d794265e775a5....png (172 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)


is this C -or- C+ -or- Python -or- not sure ? would like to add comments or fix brackets to further reverse engineer.

6507eb () No. 9245219

334f700d932f1a....png (219 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

f711778d16a55d....png (178 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

d26195bfbc6d0b....png (231 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

2712f0f12a99ca....png (204 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

80f38e94044904....png (200 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)


part 3 end.

c1a9e7 () No. 9245902



That's all in C. Majority of the code there is string (text) manipulation. What's the program?

baa8ac () No. 9246470


It's C++ there's conditional logic and loops, malloc is a memory allocation using a pointer. Nothing in those shots is unusual.

baa8ac () No. 9246546

98f2c27a63b3f3....jpg (6262 KB, 191 x 255, 3072 : 4096, IMG_20200515_1....jpg) (h)

c9e08a21d6b501....jpg (2799 KB, 191 x 255, 3072 : 4096, IMG_20200515_1....jpg) (h)

bef205b24a395d....jpg (2709 KB, 255 x 191, 4096 : 3072, IMG_20200515_1....jpg) (h)

After 6 days of lifting the stay at home order, we are back to… a new type of normal. Local zipline park or abandoned crime scene? What did someone permanent marker over the sign at the park's rest rooms?

6507eb () No. 9247116


It is software to program Alcatel Lucent hardware, MCT.exe, that one would find at a cellular site. Figure 1 there is embedded error reporting and would like to see which country they report to (Not American owned) and 2 we need to start making that stuff here so why not reverse engineer it?

6507eb () No. 9247343

b1ca5b5b21481e....png (152 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

72ffbfd2b16595....png (154 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

1ce63a1455eb43....png (157 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

649505616db35d....png (154 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

581e00d5cac295....png (153 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)


Is this one also C ?

6507eb () No. 9247370

0508d20f9dacd2....png (152 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

c45a520adcd896....png (154 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

72b27c8849c357....png (159 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

3cac843dd752da....png (155 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

db1e805e11c9ed....png (152 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)


The executable is zoom . Part 2

6507eb () No. 9247409

45014a4e6902a5....png (150 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

192c1e771e32a8....png (152 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

61071c41aa97fd....png (149 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

da9dec8474016d....png (149 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)

ccf7cfa9fb56d8....png (164 KB, 255 x 193, 1144 : 866, Screenshot_202....png) (h)


this zoom exe seems to have some weird code, , hard to look at it always locks up my node and have to dump power. Part 3

5228ca () No. 9247565

87df0cc19ad7c7....png (142 KB, 255 x 171, 646 : 433, Img_1589922930....png) (h)

a53a08 () No. 9258629

9fbc5f5bbcaff2....png (650 KB, 255 x 189, 1252 : 928, ps_kiwi.png) (h)

21def06889c0ee....png (4764 KB, 255 x 169, 1920 : 1271, 8ROnVhd.png) (h)

8144b0552c5e83....png (445 KB, 255 x 136, 1363 : 725, Screenshot_202....png) (h)

ca1e4f18c0210c....png (345 KB, 255 x 136, 1365 : 726, Screenshot_202....png) (h)



Maybe we need to look at the PNG images as well.

The tool below was originally published Dec 17, 2017 (near the start of Q drops), it was later updated Sep 23, 2019 (during downtime between 8ch/8kun).

I tried running the author's sample image through an LSB analysis and it wasn't detected


I'm not saying this is exactly what's used, but this technique or a variation of it is out there delivering executable payloads undetected.



>Encodes a PowerShell script in the pixels of a PNG file and generates a oneliner to execute

>Invoke-PSImage takes a PowerShell script and encodes the bytes of the script into the pixels of a PNG image. It generates a oneliner for executing either from a file of from the web.

>It can either create a new image using only the payload data, or it can embed the payload in the least significant bytes of an existing image so that it looks like an actual picture. The image is saved as a PNG, and can be losslessly compressed without affecting the ability to execute the payload as the data is stored in the colors themselves. When creating new images, normal PowerShell scripts are actually significantly compressed, usually producing a png with a filesize ~50% of the original script.

>With the embed method, the least significant 4 bits of 2 color values in each pixel are used to hold the payload. Image quality will suffer as a result, but it still looks decent. It can accept most image types as input, but output will always be a PNG because it needs to be lossless. Each pixel of the image is used to hold one byte of script, so you will need an image with at least as many pixels as bytes in your script.


8f9fe1 () No. 9297728

f7daf0308dc4dd....jpg (64 KB, 255 x 128, 350 : 175, LicensePlateNH....jpg) (h)

Whatever happened to live free of die?

4d5cd6 () No. 9330105

I don't know if these are commonly available but i built a python script hex to decimal calculator. Thought I'd share here.


hex to decimal calculator


value = input('Please enter the hexidecimal code here: ')

h = {'1':'1', '2':'2', '3':'3', '4':'4', '5':'5', '6':'6', '7':'7', '8':'8', '9':'9', 'a':'10', 'b':'11', 'c':'12', 'd':'13', 'e':'14', 'f':'15', '10':'16'}

lst = list()

for item in value:

item = item.lower()

converted = h.get(item, 0)



x = int(lst[0])*4096

y = int(lst[1])*256

z = int(lst[2])*16

xx = int(lst[3])*1

print(x, y, z, xx)

total_sum = (x + y + z + xx)

print('Total "Decimal Value" of Hex Code:', total_sum)

4d5cd6 () No. 9331787

590f5067a54d1c....png (188 KB, 255 x 169, 796 : 526, mod_q_table.png) (h)

4d5cd6 () No. 9331791


YouTube embed. Click thumbnail to play.

a53a08 () No. 9340169



I've ran the whole string (from the jpeg header through the end of the dashes) on several interpreters (https://tio.run/#brainfuck https://copy.sh/brainfuck/ https://fatiherikli.github.io/brainfuck-visualizer)

each of these had a seven character output "ÿññð" (hex: 01 01 01 FF F1 F1 F0)

with only the unbroken string after the forward slash as in your example outputs "òòñ" (hex: f2 f2 f1) you get -17 because the data pointer ends at 238. The pointer starts at 255 and increases/decreases with each +/- and the periods print out the value of the byte. So Q cycled the byte value up and down, printed, and then signed with value difference.

my thoughts is that it could be:

-a suspicious file signature to look for in malware or apps

-a bug that that's being exploited

>Netview SNMP Automation Task CNMAUTO unable to receive data

Start of CP-MSU data

02 D6 12 12 00 23 FF F0 00 0FFF F1 F1 F04B F3 .O…..0 …110.3

End of CP-MSU data

SNMPAPI: TRACE: Entering snmpFreeDecodedPDU

SNMPAPI: TRACE: Exiting snmpFreeDecodedPDU

SNMPAPI: TRACE: CNMAUTO request completed with return code 24004

>This shows that we are receiving a trap through the snmp automation service in netview. However, it did not get converted into an ALERT and it does not go to NPDA


-an ip address formatted in hex (not sure if executables store this ip's way), this would put it as which would put it as a class e address "reserved for experimental purposes only for R&D or Study". is the traffic for the 4am news drops or other comms being routed through an otherwise "unused" ip?

cd02c3 () No. 9344789


Ever read Sherlock Holmes?

Looks a bit like the code Holmes deciphered that had dancing men on it:


Or the flag alphabet:


cd02c3 () No. 9344939

Has anyone connected any of this to the hashing/Wikileaks connection that another Anon had found?

I've worked on it a bit myself. I'm not sure whether the connection is legit or not.

You can hash phrases from Q posts using various hashing algorithms and they result in hashes that can be used as e-mail IDs on the Wikileaks site.

Another anon mentioned that md5 can be used. I found numerous other hashing algorithms worked.

The questionable aspects of it for me were:

1. Some really old, no longer secure, algorithms were used. Why do that? Even for something like this. It de-legitimizes the whole thing.

2. Some short/nonsense strings were hashed, making it seem like whoever hashed things did so with a brute force or dictionary style approach. (e.g. "b" and "1" could both be hashed and give results)

3. There's no telling when the Wikileaks servers were updated with these e-mail IDs. Meaning, it might have seemed intelligent to have an e-mail ID for, say, "COVID-19" a year ago, but if that was hashed and those hashes were used for e-mail IDs within the past few months, that's not impressive, it's just following the news.

4. I'm yet to find any connection between the key phrases that I hash and the e-mails that come up.

It's a little odd to go through all that trouble for a nothingburger, though, on the Wikileaks end of things.

If you find strings with Ghidra that could be used as hashes or if you try hashing them, consider plugging them into the e-mail ID search for the Wikileaks e-mail drops. This might just all tie together somehow.

I got results with most if not all of these algorithms: md4, md5, sha1, sha224, sha384, sha256, sha512, ripemd160

On these addresses: (append hash to end of link)







cd02c3 () No. 9345003


Looks a bit like a cutout into a sheet of paper. Reminds me of a Grille type cipher. What's interesting about this is that people were accusing Comey, Obama, etc., of using a cipher of this type on social media to send out comms.

See: https://en.wikipedia.org/wiki/Grille_(cryptography)

If it is this kind of cipher, the real question is what it overlays on.

Thinking outside the box, it may not even belong on a word-based sheet of paper. What if it were laid onto a map to show something underneath or points of interest?

The original post this came from could give a clue what it could be laid over…

49f848 () No. 9345105

948eb8377bb577....png (1289 KB, 255 x 143, 1200 : 675, 2020.png) (h)

Disclaimer: These posts and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the administration.