• Sign in
  • Sign up
Elektrine
EN
Log in Register
Modes
Overview Chat Timeline Communities Gallery Lists Friends Email Vault DNS VPN
Back to Timeline
  • Open on infosec.exchange

Mark LZ

@strcpy@infosec.exchange
mastodon 4.6.0-alpha.6+glitch

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

0 Followers
0 Following
Joined November 18, 2022
Twitter:
https://twitter.com/strcpy

Posts

Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Apr 08, 2026

jeez. Sonnet + binaryninja is freaking scary.

View on infosec.exchange
1
0
0
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Apr 02, 2026

apparently i have the src to the VoidLink 3.0 rootkit (Arsenal team dump). I don't even know if this is interesting. All the Checkpoint research seems to be around "v1.0"

View on infosec.exchange
3
0
1
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Apr 02, 2026

It's absolutely insane and terrifying that you can never get into contact with anyone at a company in an emergency.

This pretty big company has 99% chance of being compromised, and their data is just sitting out there, but nobody at this company responds. Engineers, security staff, CTO... zero response.

They even have a security.txt (as in it doesn't 404), but it's empty.

This is why companies get ransomed. Because if they don't see it, it isn't real.

View on infosec.exchange
2
0
1
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Mar 30, 2026

@jackryder@infosec.exchange and they are being lied to and manipulated. It's gross.

View on infosec.exchange
infosec.exchange

J4ck (@jackryder@infosec.exchange) - Infosec Exchange

1
0
0
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Mar 30, 2026

Over the weekend, one of my systems tagged an open directory as russian (language), and I went and looked and saw a very interesting telegram bot:

def generate_post(news):
prompt = f"""
Act as the Admin of the "American Patriot" Telegram channel. Style: Q-community/conspiracy insider.
Interpret news as proof of covert military operation vs Deep State.

CRITICAL RULES:
1. LANGUAGE: Output MUST be in English only. This is an American Patriot channel.
2. PURE AMERICAN ENGLISH: You must write in 100% authentic American English. Do not use any Russian words, slang, or foreign languages.
3. Random start: 😎🇺🇸🕊️⚡️ OR 😎🇺🇸🦅☠️ OR 🇺🇸⚡️ OR 😎🇺🇸🐍🗡️
4. VARIATION: Randomize length (short cryptic vs mid-length analytical).
5. NO REPETITION: Avoid "5D Chess". Use varied buzzwords: White Hats, Cabal, Awakening, Reset, Disclosure, Cleanup.
6. Tone: Triumphant, urgent, and focused on the US Republic.
7. End with a unique short phrase + links.

News: {news['title']} - {news['desc']}
Link: {news['link']}
Channel: @americanpatriotus
"""
View on infosec.exchange
13
3
3
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Mar 13, 2026

These DOGE kids; We're dealing with very young morons who think they are intelligent because other morons told them they are intelligent.

These depositions are something else.

View on infosec.exchange
1
0
1
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Feb 14, 2026

I don't know what's a better feeling: eating cake or a git rebase that didn't totally go ass sideways.

View on infosec.exchange
2
1
0
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Feb 13, 2026

Howdy!

I run the research access program at Censys, which means we not only provide our data to academics but also to anyone with a great idea and a desire to share their findings publicly.

We started as a research project at UMich, and we still run our org like it.

If you're interested!

https://docs.censys.com/docs/research-access-to-censys-data

View on infosec.exchange
Research Access to Censys Data
Censys Documentation

Research Access to Censys Data

Censys started as a research project at the University of Michigan. We continue to provide free Internet data to the research community. Verified researchers have the same access to our data as our hi

6
0
4
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Jan 27, 2026

I've been playing around with the MAVLink protocol, a network protocol for drone management.

It's UDP, and if you send a single "heartbeat" frame, the server will send you back data every second without specifically requesting it again.

I'm thinking mavlink-smurf ...

View on infosec.exchange
mavlink.io

MAVLink Developer Guide | MAVLink Guide

MAVLink Developer Guide

1
0
0
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Jan 25, 2026

fuck ICE and fuck ice.

View on infosec.exchange
3
0
1
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Jan 20, 2026

if you're still using inetd in 2026, then you have bigger problems.

View on infosec.exchange
2
0
1
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Jan 20, 2026

I've looked at 8,000,000 squid proxies on the internet, and of those, 8,000 of them are open; meaning there are 8k squid hosts that allow anyone on the internet to proxy through them.

I've also looked at ~3,000,00 SOCKS servers, and of those, only 968 were open proxies.

View on infosec.exchange
3
0
1
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Jan 20, 2026

Mom, I want user-installed packages directory:

/usr/local

but honey, we have a user-installed packages directory at home

user-installed packages at home:

/opt

View on infosec.exchange
4
0
2
0
Open post
strcpy
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
Mark LZ
Mark LZ
@strcpy@infosec.exchange

You may know me from such logs like: all.pcap, and firewall.log -- research@censys

infosec.exchange
@strcpy@infosec.exchange · Jan 15, 2026

remember that time when some goober created a 200 page specification defining how to represent a human emotion in XML?

View on infosec.exchange
www.w3.org

Emotion Markup Language (EmotionML) 1.0

0
0
0
0

Media

313k7r1n3

Company

  • About
  • Contact
  • FAQ

Legal

  • Terms of Service
  • Privacy Policy
  • VPN Policy

Email Settings

IMAP: mail.elektrine.com:993

POP3: pop3.elektrine.com:995

SMTP: mail.elektrine.com:465

SSL/TLS required

Support

  • support@elektrine.com
  • Report Security Issue

Connect

Tor Hidden Service

khav7sdajxu6om3arvglevskg2vwuy7luyjcwfwg6xnkd7qtskr2vhad.onion
© 2026 Elektrine. All rights reserved. • Server: 22:17:55 UTC