@kernelpool.bsky.social
@opensectraining.bsky.social
501(c)(3) Nonprofit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021!
@xenokovah.bsky.social
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of OpenSecurityTraining2 https://ost2.fyi
@binarly.bsky.social
⛓️Binarly is the world’s most advanced automated software supply chain security platform.
@mrexodia.bsky.social
and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
@anthropic.com
We're an Al safety and research company that builds reliable, interpretable, and steerable Al systems. Talk to our Al assistant Claude at Claude.ai.
@matthewdgreen.bsky.social
I teach cryptography at Johns Hopkins. https://blog.cryptographyengineering.com
@corellium.bsky.social
The R&D platform for the next generation of smart devices – iOS, Android, and Arm. Visit us at corellium.com to learn more.
@interruptlabs.bsky.social
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between. www.interruptlabs.co.uk
@thezero.org
Security Researcher @shielder.com. Organizer @tumpicon.org. Former KeepassXC maintainer. Expanding the Tor network one exit-node at a time @osservatorionessuno.org thezero.org
@marcozzi.net
🇪🇺🇧🇪 Permanent researcher in cybersecurity (fuzzing). Works at CEA List Institute from Université Paris-Saclay (France). http://www.marcozzi.net I make software safer by viciously torturing it to reveal its flaws. I can be kind too.
@raptor.infosec.exchange.ap.brid.gy
When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl. [bridged from https://infosec.exchange/@raptor on the fediverse by https://fed.brid.gy/ ]
@hnsec.infosec.exchange.ap.brid.gy
Trust, but verify. [bridged from https://infosec.exchange/@hnsec on the fediverse by https://fed.brid.gy/ ]
@alexandreborges.bsky.social
Vulnerability Researcher | Exploit Developer (speaker 3x at DEF CON)
@mhlakhani.bsky.social
I try to learn everything. Views hopefully my own. Nerd (PL, Rust, security, AI, systems, …). Leftist. Covid conscious. AuDHD (probably). YIMBY. Free Palestine.
@cxx.dev
C++ developer specializing in source and binary program analysis and transformation.
@corelanc0d3r.bsky.social
Owner Corelan Consulting🔸Cybersecurity Researcher & Trainer🔸Hacker🔸Outgoing Introvert (INFJ-A)🔸Book lover🔸Fountain pen affictionado🔸Chess amateur🔸 Foodie🔸❤️ for EQ+IQ
@obsidian.md
The free and flexible app for your private thoughts. For help and deeper discussions, join our community: http://obsidian.md/community
@markhamillofficial.bsky.social
Believe in yourself! Work hard, never give up & anything's possible! OR: Kick back, relax & aim low: You'll never be disappointed...😜 I IGNORE ALL DMs!
@fasterthanli.me
hi, I'm amos! 🍃 they/them 🫐 open-source witch & maker of snappy videos and articles at @bearcove.eu ✨ be kind, be curious articles: https://fasterthanli.me videos: https://youtube.com/@fasterthanlime podcast: https://sdr-podcast.com
@vxundergroundre.bsky.social
The largest collection of malware source code, samples, and papers on the internet. Password: infected (unofficial, this is a bot! Maintained by @yjb.bsky.social, the bot can't handle retweets, video, and maybe a few other things)
@mrphrazer.bsky.social
Binary Security Researcher, Chief Scientist at http://emproof.com and Trainer. Website: https://synthesis.to
@matrosov.bsky.social
@lorenzo2472.bsky.social
Reverse engineering, files formats and crypto. https://github.com/lclevy
@joegrand.bsky.social
Hardware hacker, computer engineer, former L0pht member and juvenile delinquent, sometimes known as Kingpin. https://linktr.ee/joegrand
@adhsec.bsky.social
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (❤️program/code analysis)🐞🔍 @adhsec on hellsite, they/them, enby, #AuDHD
@stephenfewer.bsky.social
Principal Security Researcher at @rapid7.com. Decompiler dev for Relyze. Core Metasploit dev 2009 - 2013. MSRC Top 100 2015. Pwn2Own 2011, 2021, 2024. stephenfewer.github.io
@lauriewired.bsky.social
researcher @google; serial complexity unpacker; writing http://hypertextgarden.com ex @ msft & aerospace
@hyprdude.bsky.social
vuln researcher+exploit dev | bordeaux enjoyer | friend of all cats | him/he | https://blog.coffinsec.com
@hacefresko.com
// hacking for fun // currently working as pentester // likes bug hunting and vuln research https://hacefresko.com
@alexplaskett.bsky.social
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
@sydseter.com
Co-leader OWASP Cornucopia, application security engineer, developer, geeky game creator, architect , threat modeler. https://copi.owasp.org 🌈 «Difference is of the essence of humanity» – John Hume #appsec #cybersec #owasp #cornucopia #threatmodeling
@es3n1n.bsky.social
developer, reverse engineer, occasionally a ctf player https://github.com/es3n1n
@rh0main.bsky.social
Security engineer working on Android, reverse-engineering & obfuscation. https://www.romainthomas.fr/ - https://obfuscator.re/ - https://lief.re
@h0wlu.bsky.social
🛡️REDTEAM.PL Co-founder 🦉BlackOwlSec Founder 🧜♀️ WarCon Co-founder 👨🔬Fuzzing 🕵️Web2 & Web3 Security 🪽Angel Investor
@matthiaskaiser.bsky.social
Java/Android Vulnerability Researcher. 0xACED. Ex-Apple. Posts are my own.