@carrot-c4k3.bsky.social
cyber torture pioneer. pwn2own 2024 winner. hacking, shitposting, politics. en/ru. she/her 🏳️⚧️
@bsky.defeo.lu
Researcher in cryptography @ IBM Research, chief isogenista, SageMath developer, DevOps in my spare time. Opinions my own. On Mastodon: @[email protected]
@krijn.isogeni.es
Post-doc in post-quantum cryptography. Mostly isogenies nowadays. See krijnreijnders.com
@saelo.bsky.social
V8 Security technical lead. Previously Project Zero. Phrack author. Personal account.
@naehrdine.bsky.social
ɿɘɘniϱnɘ ɘƨɿɘvɘɿ 🎦 youtube.com/@jiskac 📝 naehrdine.blogspot.com 🐥 twitter.com/naehrdine 🎓 hpi.de/classen 📱 reversing.training
@dmnk.bsky.social
【DΞCOMPILΞ NΣVΞR】 Android Red Team @google Fuzzing @aflplusplus.bsky.social CTF @enoflag (opinions my own)
@chudypb.bsky.social
Principal Vulnerability Researcher at the watchTowr | Previously: @thezdi | https://chudypb.github.io
@aflplusplus.bsky.social
We want to make fuzzing better and better Follow for updates on AFL++ & LibAFL
@interruptlabs.bsky.social
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between. www.interruptlabs.co.uk
@shanehuntley.bsky.social
Aussie security / tech guy. Google Threat Intelligence. Co-founder Threat Analysis Group (TAG). Tweets are my own not my employers.
@infosectcbr.bsky.social
@kyliemcdevitt.bsky.social
Cofounder & CEO @infosectcbr.bsky.social | Organiser @bsidescbr.bsky.social
@tiraniddo.dev
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
@hexacon.bsky.social
Offensive security conference in the heart of Paris. 10-11th October 2025 https://www.hexacon.fr/
@offensivecon.bsky.social
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
@snyff.pentesterlab.com
Founder/CEO/Trainer/Researcher/CVE archeologist @PentesterLab. Security engineer. Bugs are my own, not of my employer...
@travisgoodspeed.bsky.social
Author of books and tools for reverse engineering. Studebaker driver, but an awful mechanic. Home chip decapsulation. Currently writing a new assembler, to be released in February.
@angealbertini.bsky.social
Reverse engineer, file formats expert. Corkami, CPS2Shock, PoC||GTFO, Sha1tered, Magika... Security engineer @ Google. He/him.
@digitalcold.bsky.social
Android and baseband vulnerability researcher. Computer engineering PhD. 🇺🇸 (Washington, DC) || https://hernan.de/z
@hackerpinup.bsky.social
@lookitup.baby
Kubernetes SIG Security co-chair, container escape artist, aurora chaser, goose in the mainframe. Minneapolis. They/them. Stay punk 🏴 MSP feed info here: https://bsky.app/profile/lookitup.baby/post/3lapkhevr222w
@sijisu.eu
computers are an insecure mess Computer Science student mff.cuni.cz, CTFs with wrecktheline.com & czechcyberteam.github.io
@minimalblue.bsky.social
Senior Scientist @TU Wien / Web & Mobile Security / #drumandbass DJ 🚩 with @mhackeroni.bsky.social We_0wn_Y0u kukhofhackerei Team Austria 🔗 https://minimalblue.com/
@justinschuh.com
Back in Chicago as a stay-at-home dad starting a small business. Expect some infosec/privacy/safety, 3D printing, and politics. You're probably following me because of my old job(s). infosec.exchange/@jschuh Defunct: twitter.com/justinschuh
@matthiaskaiser.bsky.social
Java/Android Vulnerability Researcher. 0xACED. Ex-Apple. Posts are my own.
@qualys.bsky.social
@vakzz.bsky.social
Security Engineer at Zellic, a.k.a vakzz when doing bug bounties and CTFs with Perfect Blue - https://devcraft.io
@nastystereo.com
@steven.srcincite.io
Hermetic Initiate. Exploring conscience and the nature of reality. I also hack things.