Jeff Murri

6.9K posts

Jeff Murri banner
Jeff Murri

Jeff Murri

@InfoSec208

Into infosec (all of it), amateur radio, microcontrollers and other hardware. If it makes a radio wave it's cool. Aspire to eradicate duhkha.

Dharmsala Katılım Şubat 2009
1.9K Takip Edilen1.7K Takipçiler
Jeff Murri
Jeff Murri@InfoSec208·
@cyb3rops There is many a manufacturing (hell, any a power plant) with PLCs with IP addresses you can not change and only telnet access abound. They’re rock solid, been there forever and aren’t leaving anytime soon.
English
0
0
1
8
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
People who laugh and comment “who still uses telnet” have no idea how this industry actually works - or how power plants, warships, factories, baggage handling systems and other control and logistics systems are planned, built and expected to last for decades
The Hacker News@TheHackersNews

⚠️ WARNING - An unpatched critical telnetd bug (CVE-2026-32746) lets attackers gain full system access with no credentials. One connection to port 23 is enough to trigger memory corruption and execute code as root. No patch yet. Prior telnet flaw is already exploited in the wild. 🔗Read → thehackernews.com/2026/03/critic…

English
28
49
384
30.3K
Craft Gallery
Craft Gallery@5min__crafts·
🌳💧 Deep Root Watering Pipe for a New Tree
English
5
55
331
48.3K
Jeff Murri retweetledi
Nav Toor
Nav Toor@heynavtoor·
🚨 Someone just built a real-time global intelligence dashboard and open sourced it for free. It's called World Monitor. Think of it as a CNN war room meets Bloomberg Terminal for geopolitics but anyone can use it. No paid OSINT tools. No expensive subscriptions. No classified access needed. Here's what this thing tracks in real-time: → Active conflict zones with escalation scoring → 220+ military bases from 9 countries → Live military aircraft tracking (ADS-B) → Naval vessel monitoring including "dark ships" going off radar → Nuclear facilities worldwide → Undersea cables, oil pipelines, and AI datacenter clusters → Protests, sanctions, internet outages, and satellite fire detection → Prediction markets as early warning signals Here's the wildest part: It has an AI that reads 100+ news sources, classifies threats in real-time, and generates intelligence briefs automatically. Every country gets a live "Instability Index" score from 0-100 based on military activity, protests, news velocity, and structural risk. When 3+ signal types spike in the same area, military flights + protests + satellite fires, it triggers a convergence alert. This is the kind of tool governments pay millions for. It runs in your browser. One command to install. 100% Open Source. MIT License.
Nav Toor tweet media
English
419
3.3K
18K
2.1M
Jeff Murri retweetledi
Bob from RetroRGB
Bob from RetroRGB@RetroRGB·
If your GameCube is missing the SP2 port, this $5 adapter from @collingall is a good alternative. Its not as good as the SD2SP2...but if you don't have the SP2 port, you don't really have a choice, do you? ;p retrorgb.com/sd2sp1-for-gam…
English
4
11
71
8.2K
Jeff Murri
Jeff Murri@InfoSec208·
Thought this was a nothing burger until they mentioned follow on impact “allows an attacker to gather credentials, such as local user and SIP accounts, stored on a compromised GXP1600 device”.
Rapid7@rapid7

🚨 In conducting 0 day research against #Grandstream GXP1600 VoIP phones, Rapid7 Labs discovered CVE-2026-2329. The unauthenticated stack-based buffer overflow vuln ultimately allows an attacker to intercept phone calls and eavesdrop on audio. Read on: r-7.co/4tIzope

English
0
0
0
94
Jeff Murri retweetledi
Alexandre Borges
Alexandre Borges@ale_sp_brazil·
I am excited to release the extended version of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)" this 293-page deep dive offers a comprehensive roadmap for vulnerability exploitation: exploitreversing.com/2026/02/11/exp… Key updates in this extended edition: [+] Dual Exploit Strategies: Two distinct exploit versions. [+] Exploit ALPC Write Primitive Edition: elevation of privilege of a regular user to SYSTEM. [+] Exploit Parent Process ID Spoofing Edition: elevation of privilege of an administrator to SYSTEM. [+] Solid Reliability: A completely stable and working ALPC write primitive. [+] Optimized Exploit Logic: Significant refinements to the codebase and technical execution for better stability and predictability. For those who have read the original release, whose exploit was working, my strong recommendation is that you adopt this extended edition as definitive. The article guides you through the entire lifecycle of an exploit: from initial reverse engineering and vulnerability analysis to multiple PoC developments and full exploitation. I hope this serves as a definitive resource for your research. If you find it helpful, please feel free to share it or reach out with your feedback! Enjoy your reading and have an excellent day day.
Alexandre Borges tweet media
English
4
81
304
14.2K
Jeff Murri retweetledi
LaurieWired
LaurieWired@lauriewired·
today’s one-sentence horror: sudo has been largely maintained by a single person for ~30+ years
LaurieWired tweet mediaLaurieWired tweet media
English
231
1.2K
23.1K
1.1M
Jeff Murri retweetledi
R.B.C.
R.B.C.@G3tSyst3m·
Hey guys! Here’s my latest research. I've dubbed it: Living off the Process😺. I wanted to leverage already existing artifacts in a remote process to execute shellcode. We will hunt for ROP gadgets, assembly stubs, preexisting RWX memory, etc! g3tsyst3m.com/lotp/Living-of…
English
3
87
261
14.6K
Jeff Murri retweetledi
IDV
IDV@IDV_FPV·
🧵I’m building a hardware startup in 2026. 🛠️ You don't need a million-dollar lab to ship a product, but you do need the right essentials. Here is a breakdown of the electronics equipment on my bench, what it costs, and a rating of how essential it actually is.👇
IDV tweet media
English
57
154
1.5K
68.7K
Jeff Murri
Jeff Murri@InfoSec208·
@natalie_thenerd What have you been using for GB and GBA IPS shells? I’ve been buying he HISPEEDIO screen and shell bundles but I’d like to start getting some that aren’t flat colors. A couple Pokémon shells would be rad.
English
0
0
0
43