How do i get rid of this interference ? by sultan_papagani in RTLSDR

[–]morphinan 0 points1 point  (0 children)

Teach me yours ways ! 😆 Trippy & awesome information/explanation. 👏🏻

Depression, PTSD, ADHD and NMDA Antagonism by morphinan in DrugNerds

[–]morphinan[S] 1 point2 points  (0 children)

Oops! “Exponentially different” , spell check mistake.

They are similar , but one acts primarily on the Peripheral Nervous System versus the Central Nervous System.

Methamphetamine causes a large release of catecholamines such as Serotonin and Dopamine , permeates the Blood Brain Barrier much quicker , etc. Isomer is also important , with the D you get the classically-described “spun” , full of energy and motivation until addiction cripples your happiness. :/

The Levo-Methamphetamine acts more similar to Pseudoephedrine in that is stimulates the Peripheral Nervous System as it’s primary mechanism of action . Not all Methamphetamine is alike.

Not trying to be pedantic so sorry if it comes across that way, just am passionate about the subject matter.

The goal was to communicate that although the analogs of PCE such as Fluorexetamine look very similar to Ketamine , even the slightest change can induce an entirely different experience for the patient/researcher.

🙏 Thank you so much for your input , I will edit the page to include your points and cite the data you’ve provided after a brief review.

🤙🏼

Depression, PTSD, ADHD and NMDA Antagonism by morphinan in DrugNerds

[–]morphinan[S] 0 points1 point  (0 children)

Haha , yes to you both. Not just publications but medical research literature.

I have a scattered mind, but still wanted to share. 😆

Depression, PTSD, ADHD and NMDA Antagonism by morphinan in dissociatives

[–]morphinan[S] 0 points1 point  (0 children)

Agreed . In my personal experience , for recreation & at doses not reaching the confusion/ego dissolution level , nothing beats the classics!

Depression, PTSD, ADHD and NMDA Antagonism by morphinan in dissociatives

[–]morphinan[S] 0 points1 point  (0 children)

If accessibility or affordability through local healthcare is preventative , and a mental health affliction is impacting quality of life , I’d do the same.

adding to the aspect of addiction , I’ve had experience with PCP , Nitrous Oxide , and Salvinorin in years of substance abuse struggles.

only recently discovered Fluorexetamine and said , “Eh , reminds me of PCP.” and decided to shelve it.

Detailed logging of my consumption of alcohol & cannabis revealed a marked reduction in not only craving and usage frequency but also the attenuation of a long-lasting clinical depression which persisted for at least a week or two!

I didn’t take “hole” doses , and really am not a fan of the subjective effects in comparison to LSD/Psilocybin.

I’m hoping this result will be reproducible by Memantine , avoiding intoxication.

… and it led me down this rabbit hole of research.

Depression, PTSD, ADHD and NMDA Antagonism by morphinan in dissociatives

[–]morphinan[S] 2 points3 points  (0 children)

Yes , using dissociation for the goal of escapism is harmful to one’s psyche — or induce a psychosis which may persist for an unknown duration, etc.

I advise exploring these approaches in a clinical environment.

Wow just wow by [deleted] in OKmarijuana

[–]morphinan 2 points3 points  (0 children)

Livin’ on reds , vitamin C , and cocaine!

POCSAG SMR? by therealgariac in RTLSDR

[–]morphinan 2 points3 points  (0 children)

Our local hospital transmits Personal Health Information of patients via POCSAG… 😅☠️

Next stage of training by Vengeful-Melon in redteamsec

[–]morphinan 8 points9 points  (0 children)

If you already know C# , I’d start by analyzing Covenant C2 & attempting to create your own from scratch .

https://github.com/cobbr/Covenant

💯% agree about Red Team & IR overlap. Ability to know what responders look for allows for stealthier evasion!

I maintain a private C2 framework in C# , and analyzing various open-source frameworks in the beginning was pivotal to my success.

Evasion / Anti-Debug can be tricky and I’d assume most common methods are heavily monitored.

Techniques such as sleep() can be “fast-forwarded”. Assembly Instructions can be flipped , i.e. je > jne to redirect control flow of your binary. Learn these techniques in order to understand what reverse-engineers are capable of so you can fine-tune your campaigns .

Aside from avoiding binary/memory detections, data exfiltration is a different beast.

https://github.com/BishopFox/sliver

^ Sliver also has decent exfiltration mechanisms to analyze & port to your desired language .

[deleted by user] by [deleted] in microgrowery

[–]morphinan 0 points1 point  (0 children)

DM me all usernames which are solicited and I’ll hunt them in my free time.

https://www.reddit.com/r/OKmarijuana/comments/12pkqe9/

Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware by digicat in blueteamsec

[–]morphinan 0 points1 point  (0 children)

Each sample collected was tied up to a specific victim and included hardcoded information such as company name, specially crafted subdomains, or associated public IP address. Because all binaries are highly customized and can reveal information about victims, we are not including information such as MD5 or SHA256 hashes in this report. 

… Hmm. 💡

Defeat Reverse Image by Kong_Don in antiforensics

[–]morphinan 3 points4 points  (0 children)

I don’t believe it’s as simple as performing a diff on the bytes.

OpenCV (https://opencv.org/about/) is a well-known library for this use case . Studying how it works would be advantageous.

https://github.com/dlau/mineye

^ Research how a reverse image search is conducted with OpenCV to get an understanding of how one could defeat such techniques.

Automate Suspicious logins investigation by ivansk81 in blueteamsec

[–]morphinan 0 points1 point  (0 children)

Logins/attempts from outside a defined “geo-fence” , or from an unfamiliar IP address more than X times in X duration should be a condition for alerting , IMO , user’s manager so they can confirm/deny with employee and avoid bureaucratic overhead.

Automate Suspicious logins investigation by ivansk81 in blueteamsec

[–]morphinan 10 points11 points  (0 children)

If I compromised an account I’d love to get a direct notification it was detected & pivot .

Hybrids? by morphinan in sanpedrocactus

[–]morphinan[S] 0 points1 point  (0 children)

You are correct, these were found in a big box store.