@debugger.bsky.social
Self-Claimed Security “Researcher” | Ex-MSFT | Former Microsoft MVP | Interested in Security, Debugging, and Troubleshooting.
@mthcht.bsky.social
Threat Hunting - DFIR - Detection Engineering 🐙 https://github.com/mthcht 🐦 https://x.com/mthcht 📰 https://mthcht.medium.com
@alexplaskett.bsky.social
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
@thewover.bsky.social
A mountain man with an Internet connection and a professional interest in malware.
@tifkin.bsky.social
I like making computers misbehave. Does stuff at http://specterops.io. Github: https://github.com/leechristensen Mastodon: @tifkin_@infosec.exchange
@decoder-it.bsky.social
@bertjancyber.bsky.social
CSIRT | http://kqlquery.com | Microsoft Security MVP | Blue & Purple Team | SOC | SIEM | Threat Hunting | Detection Engineering | #KQL |
@thedfirreport.bsky.social
Real Intrusions by Real Attackers, the Truth Behind the Intrusion. https://thedfirreport.com
@volexity.com
A security firm providing Incident Response, Proactive Threat Assessments, Trusted Advisory, and Threat Intelligence // volexity.com
@volatilityfoundation.org
Official account of the Volatility Memory Analysis Project and Windows Malware and Memory Forensics Training. http://volatilityfoundation.org
@rmettig.com
Researcher and PhD student at LSU. Malware, memory forensics, reverse engineering, macOS, ICS/OT. Music nerd and concert junkie. Personal account. rmettig.github.io/about
@ethicalchaos.bsky.social
Ceri Coburn: Hacker | R̷u̷n̷n̷e̷r̷ DIYer| Vizsla Fanboy and a Little Welsh Bull apparently 🏴 Author of poorly coded tools: https://github.com/CCob
@bushidotoken.net
🇬🇧 | Senior Threat Intelligence Advisor at Team Cymru | Co-author SANS FOR589 | Co-founder Curated Intel
@vxundergroundre.bsky.social
The largest collection of malware source code, samples, and papers on the internet. Password: infected (unofficial, this is a bot! Maintained by @yjb.bsky.social, the bot can't handle retweets, video, and maybe a few other things)
@thedarkoperator.bsky.social
- Cybersecurity since 1998 - Information Security jack of all trades - Hacker https://www.darkoperator.com
@mrun1k0d3r.bsky.social
Live hacking content https://truecyber.world/ Red team training https://mr.un1k0d3r.world/training/ Github https://github.com/Mr-Un1k0d3r
@emericnasi.bsky.social
CyberSecurity researcher and founder of BallisKit. I have a passion for all infosec subjects especially redteam and writing offensive tools!
@splintercode.bsky.social
offensive security - windows internals - reverse engineering | X: https://x.com/splinter_code | Mastodon: https://infosec.exchange/@splinter_code | GitHub: https://github.com/antonioCoco | Blog: https://splintercod3.blogspot.com/
@dirkjanm.io
Hacker at outsidersecurity.nl. Researches Entra ID, AD and occasionally Windows security. I write open source security tools and do blogs/talks to educate others on these topics. Blog: dirkjanm.io
@matterpreter.bsky.social
Red team guy gone purple at Prelude💜 | Author of Evading EDR http://nostarch.com/evading-edr 📖 | Security research & windows internals 🦠
@natesubra.com
Adversary Simulation, Red Team Lead, Security Research @ LFI Posts are my own He/Him #redteam #offsec #malware #cybersecurity https://secdsm.org I use my real name. The trick is figuring out my handles @natesubra@infosec.exchange
@syfuhs.net
Idiot of note. Principal something or other. Runs the Windows Authentication team at Microsoft. It's my fault your password doesn't work. Mostly dog pictures. Might actually be two dogs in a trench coat. 🇺🇸 / 🇨🇦
@drazuread.com
Principal Identity Security Researcher @Microsoft. Ex-Secureworks (PhD, MSc, MEng, CITP, CCSK). And yes, opinions are my own ;)
@swissky.bsky.social
RedTeam | Pentest Author of PayloadsAllTheThings & SSRFmap http://github.com/swisskyrepo
@brkalbyrk.bsky.social
Threat Research Team Lead @malwation | TI | OSINT | DFIR | TA2AQX 📡
@tiraniddo.dev
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
@ionescu.bsky.social
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker. Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
@kostastsale.bsky.social
@thedfirreport.bsky.social | Sharing insights in #ThreatIntel, #malware, #IR & #Threat_Hunting. Opinions are mine only! 🇬🇷🇨🇦
@securepeacock.bsky.social
I find weird things on networks. #PurpleTeam | Ex Raytheon MSSP, SCYTHE, & GD | Taught at BlackHat & DEFCON | #100DaysofSigma | Keep exploring, keep learning, and stay curious.
@harmj0y.bsky.social
Researcher @SpecterOps. Coding towards chaotic good while living on the decision boundary. #dontbanequality
@hexacorn.bsky.social
Red Brain, Blue Fingers Malware Analysis, Reverse Engineering, Threat Hunting, Detection Engineering, DFIR, Security Research, Programming, Curiosities, Software Archaeology, Puzzles, Bad dad jokes https://www.hexacorn.com/blog/ hexacorn@infosec.exchange
@mrgretzky.breakdev.org
Offensive security tools developer. Malware developer, hobby music producer, bedroom DJ & ex-MMO game hacker. Creator of Evilginx / Bartender @ BREAKDEV RED.
@flangvik.bsky.social
Team Lead Kovert AS, previously Red Team TrustedSec, terrible creator of InfoSec content 📹Opinions are my own and not the views of my employer.
@casvancooten.com
@chvancooten on the bird app 🐦 --- Benevolently malicious offensive security enthusiast || OffSec Developer & Malware Linguist || NimPlant & NimPackt author || @ABNAMRO Red Team