Matrix (@gm4tr1x) 's Twitter Profile
Matrix

@gm4tr1x

Dev/Team Hashcat, Moon addicted

ID: 285310480

linkhttps://github.com/matrix calendar_today20-04-2011 22:47:48

1,1K Tweet

441 Followers

106 Following

raptor@infosec.exchange (@0xdea) 's Twitter Profile Photo

There’s a #vulnerability (CVE-2024-27867) in the #firmware of Apple #AirPods. Anyone who knows the #Bluetooth MAC address can connect to your AirPods and listen to the microphone or play music. An update is available. blogs.gnome.org/jdressler/2024…

hashcat (@hashcat) 's Twitter Profile Photo

Team hashcat has placed 2nd in the KoreLogic contest at #DEFCON32! Congrats to HashMob on 1st, and CynoSure Prime on 3rd place. Looking forward to your writeups! Big thanks to KoreLogic and Password Village for organizing the contest!

Phrack Zine (@phrack) 's Twitter Profile Photo

The time has come, and with it your reading material for the week. Phrack #71 is officially released ONLINE! Let us know what you think! phrack.org/issues/71/1.ht…

The time has come, and with it your reading material for the week.

Phrack #71 is officially released ONLINE! Let us know what you think!

phrack.org/issues/71/1.ht…
Ptrace Security GmbH (@ptracesecurity) 's Twitter Profile Photo

Exploiting Microsoft Teams on macOS during a Purple Team engagement blog.quarkslab.com/exploiting-mic… #Pentesting #CyberSecurity #Infosec

Exploiting Microsoft Teams on macOS during a Purple Team engagement blog.quarkslab.com/exploiting-mic…  #Pentesting #CyberSecurity #Infosec
Phrack Zine (@phrack) 's Twitter Profile Photo

We updated our CFP for Phrack 72! The deadline is now April 1st 2025. Check the site for specifics on how to contribute, as well as some inspiration! We also posted a link to purchase physical copies of Phrack 71, and a donation link too. Enjoy! phrack.org

We updated our CFP for Phrack 72! The deadline is now April 1st 2025. Check the site for specifics on how to contribute, as well as some inspiration! We also posted a link to purchase physical copies of Phrack 71, and a donation link too. Enjoy!

phrack.org
Chick3nman 🐔 (@chick3nman512) 's Twitter Profile Photo

Complete hashcat benchmarks on the NVIDIA GeForce RTX 5090 FE! Running nice and cool so far with solid improvements across the board. Most hash modes got at least a 20% uplift over the RTX 4090 and some modes boasting quite a bit more! Full Benchmark: gist.github.com/Chick3nman/09b…

Complete <a href="/hashcat/">hashcat</a> benchmarks on the <a href="/NVIDIAGeForce/">NVIDIA GeForce</a> RTX 5090 FE! Running nice and cool so far with solid improvements across the board. Most hash modes got at least a 20% uplift over the RTX 4090 and some modes boasting quite a bit more! 

Full Benchmark: gist.github.com/Chick3nman/09b…
Hash (@bitbangingbytes) 's Twitter Profile Photo

March 8, 2022 Published this video trying to find a way to extract a smart meters firmware… youtu.be/kli-hRqRAys Three YEARS later… March 29, 2025 Published this video extracting the firmware and showing you how it’s done! youtu.be/IOD5voFTAz8 Never stop trying

March 8, 2022 
Published this video trying to find a way to extract a smart meters firmware…
youtu.be/kli-hRqRAys

Three YEARS later…

March 29, 2025
Published this video extracting the firmware and showing you how it’s done!
youtu.be/IOD5voFTAz8

Never stop trying
Daniel J. Bernstein (@hashbreaker) 's Twitter Profile Photo

The gcc/clang excuse for changing program behavior, often introducing bugs and security holes (see usenix.org/system/files/u…), is performance. But a new paper web.ist.utl.pt/nuno.lopes/pub… modifies clang to eliminate most (all?) such changes, and finds negligible effect on benchmarks.

Open Source Security mailing list (@oss_security) 's Twitter Profile Photo

CVE-2025-6019: libblockdev: LPE from allow_active to root openwall.com/lists/oss-secu… CVE-2025-6018: LPE from unprivileged to allow_active in *SUSE 15's PAM CVE-2025-6019: LPE from allow_active to root in libblockdev via udisks Patches: openwall.com/lists/oss-secu… x.com/qualys/status/…

hashcat (@hashcat) 's Twitter Profile Photo

hashcat v7.0.0 released! After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. Detailed writeup is available here: hashcat.net/forum/thread-1…

hashcat v7.0.0 released! 

After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. 

Detailed writeup is available here: hashcat.net/forum/thread-1…
mbg (@mbrg0) 's Twitter Profile Photo

we got a persistent 0click on ChatGPT by sharing a doc that allowed us to exfiltrate sensitive data and creds from your connectors (google drive, sharepoint, ..) + chat history + future conversations it gets worse. we deploy a memory implant #DEFCON #BHUSA Tamir Ishay Sharbat

hashcat (@hashcat) 's Twitter Profile Photo

Team Hashcat took first place in the Jabbercracky contest at #DEFCON33! Thanks to HashMob for putting up a great fight and congrats on 2nd place! We're looking forward to your write-up! Huge thanks to Jabbercracky, Will Hunt @[email protected], and Password Village for organizing!

Team Hashcat took first place in the Jabbercracky contest at #DEFCON33! Thanks to HashMob for putting up a great fight and congrats on 2nd place! We're looking forward to your write-up! Huge thanks to Jabbercracky, <a href="/Stealthsploit/">Will Hunt @Stealthsploit@infosec.exchange</a>, and <a href="/PasswordVillage/">Password Village</a> for organizing!
hashcat (@hashcat) 's Twitter Profile Photo

We just finished the Jabbercracky password contest at DEFCON 33! Check out our writeup on using the new Python Bridge in hashcat 7 for rapid prototyping a solution to an unsupported hash mode: hashcat.net/forum/thread-1…

We just finished the Jabbercracky password contest at DEFCON 33! Check out our writeup on using the new Python Bridge in hashcat 7 for rapid prototyping a solution to an unsupported hash mode: hashcat.net/forum/thread-1…