@nicoleperlroth.bsky.social
cyber raconteur | author THIS IS HOW THEY TELL ME THE WORLD ENDS | former @nytimes | now betting on heroes @ Silver Buckshot Ventures + Venture Partner at Ballistic Ventures.
@rustyphasm.bsky.social
@tiraniddo.dev
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
@vxundergroundre.bsky.social
The largest collection of malware source code, samples, and papers on the internet. Password: infected (unofficial, this is a bot! Maintained by @yjb.bsky.social, the bot can't handle retweets, video, and maybe a few other things)
@swissky.bsky.social
RedTeam | Pentest Author of PayloadsAllTheThings & SSRFmap http://github.com/swisskyrepo
@w0rty.bsky.social
Organizer of HeroCTF || ctf w/ FlatNetworkOrg || TeamFR 2021 & 2022 🇫🇷 || 🥷 Synacktiv
@aethlios.bsky.social
Technical Lead @yeswehack.bsky.social | Bug hunter (approximately every 3 months) > https://aeth.cc
@nastystereo.com
@monke.ie
Irish web hacker. Founder @ Simian Security. Newsletter every week at https://monke.ie. Reach out at https://simiansecurity.com 🇮🇪/🇯🇵
@bi.tk
@ryotak.net
Security researcher? | Icon: https://twitter.com/MelvilleTw | Keybase: http://keybase.io/ryotak | Threads: http://threads.net/ryotkak | Misskey: http://misskey.io/@ryotak
@blaklis.bsky.social
CTF player with The Flat Network Society - bug bounty & web security research
@bakbakbak.bsky.social
@wilfri3d.bsky.social
@chudypb.bsky.social
Principal Vulnerability Researcher at the watchTowr | Previously: @thezdi | https://chudypb.github.io
@reverseth.bsky.social
French pentester, but currently traveling around the world. Passionate about hacking, I also enjoy building things with Rust.
@gabrielthierry.bsky.social
Journaliste, aux manettes de la newsletter cybercrime Pwned | gabrielthierry@protonmail.com https://linktr.ee/gabrielthierry
@flutsunami-is-aska.bsky.social
Former RE team lead @synacktiv - Former @AirbusSecLab lead Collector of Quote
@pilvar.bsky.social
CTF w/ organizers and polygl0ts | ECSC swiss team & ICC team EU 24 | CS student @ EPFL
@adhsec.bsky.social
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (❤️program/code analysis)🐞🔍 @adhsec on hellsite, they/them, enby, #AuDHD
@thegrugq.bsky.social
@fuzzysec.bsky.social
意志 / Antiquarian @ IBM Adversary Services / Ex-TORE ⚔️🦅 / I rewrite pointers and read memory / AI Psychoanalyst / Teaching at labs.calypso.pub
@saelo.bsky.social
V8 Security technical lead. Previously Project Zero. Phrack author. Personal account.
@irsdl.bsky.social
Hacker (ethical), web appsec specialist, trainer, tools builder & apps breaker, X: @irsdl https://secproject.com/ https://soroush.me/ https://burpsuite.ninja/
@richinseattle.bsky.social
Fuzzing; Vulnerability Research; Deep Learning; Reverse Engineering Training & Publications @ http://fuzzing.io Hacking the planet since 1995 Undercurrents.io BOFH I'll stop the world and melt with you
@ajxchapman.bsky.social
Full Time #BugBounty Vulnerability Researcher https://blog.ajxchapman.com
@snyff.pentesterlab.com
Founder/CEO/Trainer/Researcher/CVE archeologist @PentesterLab. Security engineer. Bugs are my own, not of my employer...
@sinsinology.bsky.social
Pwn2Own 20{22,23,24,24.5}, i look for 0-Days but i find N-Days & i chase oranges 🍊 https://summoning.team/
@pwntester.bsky.social
Security Researcher with @GHSecurityLab. CTF #int3pids. Opinions here are mine!