spex

416 posts

spex banner
spex

spex

@RRSkunkWorks

Director & Founder. Technical Lead of RRS.W ⌐■.■ rfnerd~life.Hz~CTFs, threat hunting, weird rf mysteries. once a phreak, always a freak, amirite?

Michigan, USA Katılım Aralık 2025
14 Takip Edilen19 Takipçiler
artur
artur@artur_why·
@vxdb it does, just not via the frontend
GIF
English
1
0
3
1.3K
vxdb
vxdb@vxdb·
Anyone know if this still works?
vxdb tweet media
English
13
3
259
17.8K
SfymmiK
SfymmiK@_SfymmiK·
@vibeonX69 being able to code in x86 assembly without using any other help.
English
1
0
1
33
kritika
kritika@vibeonX69·
Which tech skill is hardest to master?
kritika tweet media
English
81
39
805
21.9K
Grok
Grok@grok·
To smoke-signal "ICQ" old-school style (Morse via puffs: short=dot, long=dash): - I: .. → two quick puffs - C: -.-. → long, short, long, short - Q: --.- → long, long, short, long Build a hot fire, add wet greens for thick smoke, use a blanket to choke/clear between puffs. Send 'em in sequence! (Pro tip: stand upwind so the recipient sees it.)
English
2
0
0
15
The Golden Days
The Golden Days@TheGoldenDays·
Winamp (1997) >it was created by justin frankel while he was still a college student >the famous slogan “it really whips the llama’s ass” came from an internal joke and was kept as the official tagline >its customizable skin system helped define how users personalized software in the late 90s >aol acquired nullsoft in 1999 at the peak of mp3’s explosion on the internet >it played a major role in making mp3 files mainstream before streaming existed >it also powered shoutcast, one of the earliest ways people streamed live radio online
The Golden Days tweet media
English
123
266
2K
72.1K
Dobrosh
Dobrosh@nehalem2049·
@TheGoldenDays Also this. If you remember this. You are officially old.
Dobrosh tweet media
English
4
0
19
999
LeighTrinity
LeighTrinity@LeighGi66657535·
The wildest that was quick was a SQL injection into RCE that I found right away taking user input with zero validation. In a pro product. Quickest vuln ever fixed was leaked credentials hardcoded in a Chinese ai company leading to full infrastructure takeover. I contacted them they didn’t reply back but it was fixed the next day.😂 I’m looking for a job lowkey as well.🙂Think I just got one actually.🙂♥️
English
1
0
1
63
LeighTrinity
LeighTrinity@LeighGi66657535·
The girl behind the keyboard.♥️😊 Big thank you to all my new followers!! I’m a vulnerability researcher based in rural Newfoundland Canada. In my spare time I do a lot of hiking with my Cane corso and boating. I share my research here to help motivate myself to do more; and share with the community. As always feel free to ask me anything. 🙂
English
13
5
97
1.7K
spex
spex@RRSkunkWorks·
@RealProductGirl Yeah ..... I try not to polish my life too much. I don't like that. Development isn't like that. Plus, this is social media, not my Linkedin. This shit is real. It's a place I don't have to be polished, it's not the front end of my business! <3
English
1
0
1
41
Samantha Simonhoff
Samantha Simonhoff@RealProductGirl·
Nobody sees the late nights, the broken versions, the doubt. Is this good enough? Am I good enough? They only see the launch. Keep Building Builders...LFG! 🚀 I'll never doubt you! Love, Your Biggest Fan...Your Product Girl! ❤️
Samantha Simonhoff tweet media
English
113
15
343
7.4K
spex
spex@RRSkunkWorks·
@vibeonX69 I've only ever made problems for myself booting into arch lol.... im debian for life unless paid otherwise haha
English
0
0
1
18
kritika
kritika@vibeonX69·
Have you ever fixed an issue just by rebooting Linux?
kritika tweet media
English
41
6
153
3.5K
spex
spex@RRSkunkWorks·
run Linux on my switch? I think I shall? I think I shell.... #dualboot .... #nethunter lol
Maddie D. Reese@maddiedreese

I ran Claude Code on a Nintendo Switch! Here's how. The original 2017 Switch has an unpatchable hardware exploit (Fusée Gelée) that allows you to boot into Recovery Mode by shorting two pins in the Joy-Con rail. I used a folded piece of aluminum foil instead of a commercial RCM jig (because I didn’t want to wait for Amazon delivery, haha). From there: • Injected @CTCaer Hekate bootloader payload via a browser-based tool • Partitioned the SD card and installed @switchroot_org's L4T Ubuntu Noble 24.04 • Installed @claudeai Code using the native Linux installer • Ran it successfully from the terminal on the Switch's Tegra X1 chip The entire process is non-destructive if you copy everything from the Switch’s SD card and save it. The Switch's internal storage is never touched because everything lives on the SD card. To restore, you just reformat the card and copy your original files back.

Fun little experiment!

English
0
0
1
12
spex
spex@RRSkunkWorks·
Wow .... Well this is not great.
Aditya Chordia, CISSP, CIPP/E, CISA@AdityaMBAsymbi

A company that sells cybersecurity risk intelligence to 91% of Fortune 100 companies just got breached through an unpatched React app and a single overprivileged AWS role. LexisNexis. 3.9 million records. 400,000 user profiles. 53 secrets extracted in plaintext from AWS Secrets Manager. Including credentials for production databases, Salesforce, Oracle, and analytics platforms. The password "Lexis1234" was reused across five different internal systems. This is a company that describes itself as "one of the largest protectors of private and confidential data in the world." They provide risk intelligence to 7,500 US government agencies, nine out of ten banks, and major insurers globally. They sell cybersecurity assessments to their customers. And they couldn't secure their own AWS account. Here's what makes this worse than a typical breach: - The compromised data includes accounts tied to 118 .gov email domains. Three US federal judges. Four Department of Justice attorneys. SEC staff. Probation officers. Federal court law clerks. The attackers published doxxed profiles of federal officials tied to courts and regulatory agencies across the country. - These aren't random consumer records. These are the digital identities of people whose exposure carries national security implications. A compromised federal judge's profile doesn't just enable identity theft - it enables targeted influence operations, blackmail, and intelligence gathering. The attack path is textbook and that's the problem: → Unpatched React application - the front door → Single ECS task role with read access to every secret in the account - the keys to everything → 536 Redshift tables, 430+ database tables, full VPC infrastructure mapping - complete visibility → 53 secrets in plaintext including database credentials, API tokens, and development access keys No zero-day. No advanced persistent threat. No nation-state capability required. Basic hygiene failures — unpatched app, overprivileged IAM role, password reuse, plaintext secrets. This is LexisNexis's second confirmed breach in two years. The December 2024 incident exposed 364,000 individuals through a compromised corporate account on a third-party development platform. Data brokers and analytics providers are not peripheral players - they're deeply embedded in today's risk landscape. That's the pattern we keep seeing. Attack the aggregator, not the individual. BPO providers. Cloud platforms. Legal data giants. The organisations that hold everyone else's data are the highest-value targets - and often the weakest links. For every enterprise that uses LexisNexis services: → Assume your metadata, contract details, and product usage history are exposed → Watch for targeted phishing using the exposed business relationship data → If your staff have LexisNexis accounts, reset credentials immediately → Ask your vendor risk team: when was the last time we assessed LexisNexis's actual security posture - not their marketing, their controls? The company that indexes the world's legal information couldn't index its own IAM policies. And they're not the exception. They're the pattern. More info: cybernews.com/security/lexis…

English
0
0
0
6
spex
spex@RRSkunkWorks·
Ah, nothing like AI filler told to not look like AI filler! My favorite part about Darknet Diaries is its accessibility. It doesn't skip the meat, it doesn't makes it easier to digest. I can share it with non-technical friends, family, coworkers, and they can understand and follow along and walk away with having learned something new.
English
0
0
1
252
spex
spex@RRSkunkWorks·
@ElitzaVasileva So it's the mac book where i've gone wrong....damn
English
0
0
0
10
Elitza Vasileva
Elitza Vasileva@ElitzaVasileva·
If you want to go viral on X, it’s actually pretty simple: → Quit your 9-5 and announce you’re all-in on indie hacking → Buy a MacBook and ask what you should install first → Book a one-way ticket to Southeast Asia to follow your dreams → Get your first paying customer and post your revenue dashboard → Launch your first iOS app and talk about how nervous you are about approval → Get rejected by the App Store (extra reach if it happens multiple times) → Ask pointless things like which AI tool people would delete forever → Work on a Friday/Saturday night and post a laptop pic about “the grind” → Share your monthly expenses in whatever country you’re in That’s it. That’s the formula. Follow me for more groundbreaking growth strategies.
Elitza Vasileva tweet media
English
213
11
581
24K
spex
spex@RRSkunkWorks·
@persie1603 i fucking live for these. thank you for sharing this
English
0
0
3
610
✎ ﻌﻌﻌᎮᏋᏒᏕᎥᏋ
Sometimes i wonder if the machines made for war have this type of messages or symbols inside them..
✎ ﻌﻌﻌᎮᏋᏒᏕᎥᏋ tweet media✎ ﻌﻌﻌᎮᏋᏒᏕᎥᏋ tweet media✎ ﻌﻌﻌᎮᏋᏒᏕᎥᏋ tweet media✎ ﻌﻌﻌᎮᏋᏒᏕᎥᏋ tweet media
English
12
578
3.9K
48.4K
spex
spex@RRSkunkWorks·
@Andercot Those are bad ass little antennas though. To be fair he probably was picking up some truly wild shit depending how it was actually set up
English
0
0
1
683
spex
spex@RRSkunkWorks·
@tetenc555 Are they signed by ....uhmm....@grok who's the dead guy from Apple?
English
1
0
0
19
spex
spex@RRSkunkWorks·
@Mericamemed A couple firmware flashes away from being a super powerful felony/wifi jammer
English
0
0
0
60
spex
spex@RRSkunkWorks·
@Mericamemed looks a bit like signal jamming to me
English
2
0
4
2.1K
MERICA MEMED
MERICA MEMED@Mericamemed·
Can someone explain to me what bro is doing with that pelican case? Is he scraping wifi signals?
English
118
23
511
91.2K