Event JSON
{
"id": "1f5bf97542364dffe24add12ba7ce16742d701c91b9953057c04eb965eb56980",
"pubkey": "b37f2f2bd4bffd50b185d7fe859414fe112c86920b816236cc710474dd32dd6c",
"created_at": 1676909122,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@Muddobbers/109897916232635268",
"web"
],
[
"t",
"reverseengineering"
],
[
"t",
"malware"
],
[
"t",
"arm"
],
[
"t",
"arm64"
],
[
"t",
"pentesting"
],
[
"t",
"introduction"
],
[
"t",
"arduino"
],
[
"t",
"ia32"
],
[
"t",
"python"
],
[
"t",
"dfir"
],
[
"t",
"forensics"
],
[
"t",
"guildwars2"
],
[
"t",
"rustlang"
],
[
"t",
"raspi"
],
[
"proxy",
"https://infosec.exchange/users/Muddobbers/statuses/109897916232635268",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/Muddobbers/statuses/109897916232635268",
"pink.momostr"
]
],
"content": "Hello! Let's get my #introduction going here.\n\nProfessionally right now I work as an SME in a #PenTesting group for a regulatory company, but it's really not my bag of tea in the long run. That I can feel. I much prefer to be in an investigatory and tool-making field for something related to #DFIR . I was especially happy doing #ReverseEngineering of #malware .\n\nI'm into reverse engineering, assembly languages like #IA32 and recently #ARM / #ARM64, programming (old classics like C/C++ / #Python but learning the newer stuff like #RustLang ), big into #forensics, #RasPi and #Arduino projects and such.\n\nStill trying to figure out what I am career wise, though, like job title and such! It's all great fun to me, just haven't found the direct niche to sink into.\n\nHobby wise, I'm also really into #GuildWars2! Long time gamer at heart.",
"sig": "29019e67371598122b5ebc181a6dcfaf878bb982e47f4afecc682212e43f8cbab7b9ebe30fbcaaab10d7757cabaaaebc453dcd3f8e1b15ec92677be332233283"
}