Starter Packs
Created by André Moulu (1)
Commodore Format Archive's Starter Pack
Commodore Format’s favourite feeds!
@x30n.bsky.social
Hacker, Vuln Research, 2x winner DEF CON CTF, Founder & CEO Blackwing Intelligence, not a CISSP
@gabrielthierry.bsky.social
Journaliste, aux manettes de la newsletter cybercrime Pwned | [email protected] https://linktr.ee/gabrielthierry
@phenol42.bsky.social
Former chemistry student. 42born2code alumni. Reversing and pwning stuffs at RandoriSec.
@agarri.fr
Web hacker 😈 Burp Suite Pro trainer 👨🏫 Maintainer of @mastering-burp.agarri.fr 🛠️
@mjg59.eicar-test-file.zip
Former biologist. Actual PhD in genetics. Security at https://aurora.tech, OS security teaching at https://www.ischool.berkeley.edu. Blog: https://mjg59.dreamwidth.org Signal: @mjg.59 He/him
@rpw.bsky.social
@spender.bsky.social
President of @opensrcsec, developer of @grsecurity Personal account
@typeischeap.bsky.social
Firmware security nerd. I fix things that you break. He/him. Mastodon: @[email protected] Posts are my own and do not represent my employer.
@dwizzzle.bsky.social
Corporate Vice President, OS Security and Enterprise @Microsoft
@oflynn.com
Colin is a huge nerd. Hardware hacking, open-source hardware, electronics design, academic stuff, dog stuff in some order. Assistant Prof @ Dalhousie Uni, advisor/co-founder NewAE Technology Inc.
@quine.bsky.social
Wearer of several infosec name tags & hairnets over the last 20+ years. Opinions (and the like) are mine.
@alexplaskett.bsky.social
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
@themaks.bsky.social
Infosec Enthusiast, Reverse Engineer, Vuln Researcher, Cat Owner (in no particular order)
@affine.group
Researcher in Cryptography (symmetric-key, white-box, post-quantum, etc.) https://affine.group
@naehrdine.bsky.social
ɿɘɘniϱnɘ ɘƨɿɘvɘɿ 🎦 youtube.com/@jiskac 📝 naehrdine.blogspot.com 🐥 twitter.com/naehrdine 🎓 hpi.de/classen 📱 reversing.training
@buherator.bsky.social
"I'm interested in all kinds of astronomy." https://scrapco.de Mostly cross-posting from Fediverse: @[email protected]
@cleptho.bsky.social
Offensive Security | Вічна пам'ять / Вечная память https://twitter.com/cleptho | https://infosec.exchange/@cleptho
@xenokovah.bsky.social
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of OpenSecurityTraining2 https://ost2.fyi
@phlaul.bsky.social
@richinseattle.bsky.social
Fuzzing; Vulnerability Research; Deep Learning; Reverse Engineering Training & Publications @ http://fuzzing.io Hacking the planet since 1995 Undercurrents.io BOFH I'll stop the world and melt with you
@dmnk.bsky.social
【DΞCOMPILΞ NΣVΞR】 Android Red Team @google Fuzzing @aflplusplus.bsky.social CTF @enoflag (opinions my own)
@digitalcold.bsky.social
Android and baseband vulnerability researcher. Computer engineering PhD. 🇺🇸 (Washington, DC) || https://hernan.de/z
@perrib.us
DARPA Program Manager | Organizing DEF CON CTF with Nautilus | RPISEC Alumna | Personal account, opinions my own, RT ≠ endorsement
@astarasikov.bsky.social
Used to be posting about programming and embedded. Now just tired of typing out a bio again for each new twitter replacement.
@nicolasjoly.bsky.social
@bkerler.bsky.social
[email protected], [email protected] TZ pwner, reverse engineer and cryptanalyst
@thezdi.bsky.social
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
@offensivecon.bsky.social
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
@talosintelligence.com
The Official account of the Cisco Talos Intelligence Group. Support requests: http://talosintelligence.com/support
@saelo.bsky.social
V8 Security technical lead. Previously Project Zero. Phrack author. Personal account.
@zeewox.infosec.exchange.ap.brid.gy
#YOLOL Information Security [bridged from https://infosec.exchange/@zeewox on the fediverse by https://fed.brid.gy/ ]
@lcamtuf.coredump.cx
Substack: http://lcamtuf.substack.com/archive Homepage: http://lcamtuf.coredump.cx