@nyanbox.stackchk.fail
aka itszn (itszen) 0xffff000041414141 Security researcher creating pwnable puzzles https://infosec.exchange/@nyanbox https://x.com/itszn13 LLM Art: https://bsky.app/profile/alternet.site
@richinseattle.bsky.social
Fuzzing; Vulnerability Research; Deep Learning; Reverse Engineering Training & Publications @ http://fuzzing.io Hacking the planet since 1995 Undercurrents.io BOFH I'll stop the world and melt with you
@thegrugq.bsky.social
@alexplaskett.bsky.social
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
@mjg59.eicar-test-file.zip
Former biologist. Actual PhD in genetics. Security at https://aurora.tech, OS security teaching at https://www.ischool.berkeley.edu. Blog: https://mjg59.dreamwidth.org Signal: @mjg.59 He/him
@steven.srcincite.io
Hermetic Initiate. Exploring conscience and the nature of reality. I also hack things.
@rdj.bsky.social
CyberSecurity student at TU Eindhoven - CTF with https://superfl.at / https://org.anize.rs
@filippo.abyssdomain.expert
RC F'13, F2'17 Cryptogopher / Go cryptography maintainer Professional open source maintainer https://filippo.io / https://github.com/FiloSottile https://mkcert.dev / https://age-encryption.org https://sunlight.dev / https://filippo.io/newsletter
@retr0.id
reverse engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time Fedi: @[email protected] Macroblog: https://www.da.vidbuchanan.co.uk/blog/
@jurrevanbergen.nl
Technologist at Amnesty's Security Lab. Here's how to contact me securely: https://gist.github.com/DrWhax/61978d4e7df5291d4cf308f10dc20d5a