Sabitlenmiş Tweet
MooseMatrix.Eth
238 posts

MooseMatrix.Eth
@MooseMatrix
Security Researcher 🧙♂️ | Software Development & Security Student | Binary Bender | Reverse Engineer | Smart Contract Security
Tokyo, Japan Katılım Ağustos 2021
857 Takip Edilen93 Takipçiler
MooseMatrix.Eth retweetledi

As we continue to progress through the year 2024 I want to let everyone know that we need each other more than you all probably realize. Bernard's advice is so humbling and we need to be kind to one another while striving for greatness.
youtu.be/9fvETktnaRw?si… via @YouTube

YouTube
English

Looking for a video on a specific hacking technique/tool? Check out ippsec.rocks - Searches over 100 hours of my videos to find you the exact spot in the video you are looking for.

English
MooseMatrix.Eth retweetledi
MooseMatrix.Eth retweetledi

@seclilc If this is real you need to add me so we can chop yews together hahahaha
English

As @DahvidSchloss said, "OK, all my Pixelated Pirates and Syntax Saboteurs", it's time for me to reveal my premier cybersecurity walkthrough on my YouTube channel exploring Ingreslock TCP Port 1524 Vulnerability | Penetration Testing
youtu.be/ZV4Hn_mpgH4?si… via @YouTube

YouTube
English

@HolySmokas 500k probably and even that’s a low ball with inflation and current economy
English

@HackingDave I know I’m late to this post, I don’t check social media often, but this is wholesome. Thank you for sharing @HackingDave 🥰
English

I recently found a video on TCP/IP by @aSteveCleary and really found immense value in it. Please consider checking it out and check his work out. Very valuable information.
GIF
English

This would be a really interesting episode if a team like @_JohnHammond @davidbombal @0dayCTF got together and produced a unique episode deep diving with a story teller like @JackRhysider ?!?!?
profdeibert@RonDeibert
Are you an #Apple user who may be at high risk for targeted espionage? Turn on Lockdown Mode. We haven't yet observed an example of a Pegasus or other spyware infection of a target's device with it activated... support.apple.com/en-ca/HT212650
English

I know I’m super late to the party, especially in the tech world, but these 0 day exploits are really interesting! Great work @citizenlab and thank you for your research and insights @ihackbanme
The Citizen Lab@citizenlab
🚨🚨WE URGE EVERYONE TO UPDATE THEIR APPLE DEVICES AS SOON AS POSSIBLE. We have found an actively exploited #zero #click vulnerability that was used to deliver #NSO group’s #Pegasus #spyware. citizenlab.ca/2023/09/blastp…
English

@GabrielLandau @Octoberfest73 I’ll be deep diving this weekend over Labor Day!!
English

@MooseMatrix @Octoberfest73 Thanks @MooseMatrix . There’s a lot more in the article than the video 😀
English

Shout out to @Octoberfest73 for introducing me to @GabrielLandau. This video is one of the first few pieces of his research that has blown me away!! 🤓😎💻
Gabriel Landau@GabrielLandau
Forget vulnerable drivers - Admin is all you need Article 👉 elastic.co/security-labs/… 👇 Demo - enable sound 🔊
English

@Steph3nSims I watched your episode with @davidbombal on YouTube about exploiting Buffer Overflows. Very awesome stuff. One pearl of knowledge I took away was how to find the return memory address rather than using cyclic to find the pattern we jammed in.
English












