@reconmtl.bsky.social
Recon is the premier Reverse Engineering and Security conference held annually in Montreal. https://recon.cx
@lcamtuf.coredump.cx
Substack: http://lcamtuf.substack.com/archive Homepage: http://lcamtuf.coredump.cx
@bishopfox.bsky.social
A leading provider of #offensivesecurity solutions & contributor to the #infosec community. #pentesting #hacking
@dustri.org
Blog feed for https://dustri.org/b Also available at https://infosec.exchange/@jvoisin
@darkmentor.com
Specializing in full-stack bluetooth security, firmware security, and security education.
@hackthis.ai
AI Security @ NVIDIA OSS Security @ Project Jupyter and NumFOCUS https://developer.nvidia.com/blog/author/jolucas/
@xkcd.com
@bufferbuster.bsky.social
Developer of Binary Ninja, experimenter with a vast multitude of unfinished side projects
@justdionysus.bsky.social
Walking around Baltimore, looking for stuff to do. Trying to make computers do stuff in the dumbest way possible.
@linkersec.bsky.social
Links related to Linux kernel security and exploitation. Maintained by @andreyknvl.bsky.social and Alexander Popov. Also on https://t.me/linkersec, https://x.com/linkersec, and https://infosec.exchange/@linkersec.
@xenokovah.bsky.social
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of OpenSecurityTraining2 https://ost2.fyi
@shielder.com
InfoSec boutique. Owning things since 2014. We love to go for the extra mile, where we usually find the best 🦟🐞🪲🪳🐛🐜🕷 the others miss. Web: https://www.shielder.com Twitter: @ShielderSec Fediverse: @shielder.infosec.exchange
@oflynn.com
Colin is a huge nerd. Hardware hacking, open-source hardware, electronics design, academic stuff, dog stuff in some order. Assistant Prof @ Dalhousie Uni, advisor/co-founder NewAE Technology Inc.
@daveaitel.bsky.social
@matthiaskaiser.bsky.social
Java/Android Vulnerability Researcher. 0xACED. Ex-Apple. Posts are my own.
@synacktiv.com
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
@rh0main.bsky.social
Security engineer working on Android, reverse-engineering & obfuscation. https://www.romainthomas.fr/ - https://obfuscator.re/ - https://lief.re
@felmoltor.me
Mastodon felmoltor@defcon.social. Now with more #OSCP than the previous version. Working @SensePost.com - Orange Cyberdefense https://blog.felipemolina.com/
@qualys.bsky.social
@cleptho.bsky.social
Offensive Security | Вічна пам'ять / Вечная память https://twitter.com/cleptho | https://infosec.exchange/@cleptho
@mtalbi.bsky.social
@maddiestone.bsky.social
Security Researcher at Google Project Zero. 0-days all day. Love all things reverse engineering. she/her
@stephenfewer.bsky.social
Principal Security Researcher at @rapid7.com. Decompiler dev for Relyze. Core Metasploit dev 2009 - 2013. MSRC Top 100 2015. Pwn2Own 2011, 2021, 2024. stephenfewer.github.io
@steven.srcincite.io
Hermetic Initiate. Exploring conscience and the nature of reality. I also hack things.
@tiraniddo.dev
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
@fuzzysec.bsky.social
意志 / Antiquarian @ IBM Adversary Services / Ex-TORE ⚔️🦅 / I rewrite pointers and read memory / AI Psychoanalyst / Teaching at labs.calypso.pub
@saelo.bsky.social
V8 Security technical lead. Previously Project Zero. Phrack author. Personal account.
@comms.net
🔐 Pen Tester, Red Teamer 🧠 Artificial Intelligence / Naturally Stupid 🛠️ Maker / Breaker 🖥️ Home Labber 🚲 A rusty bicycle of the Information Super Highway.