Ojaswi Kumar Mishra
Old-school Security Researcher | ⚡Kernel Pwner⚡ | Research IPv6 Blog: http://kr1m1nal.net
@vxundg-ported.bsky.social
Ported vx-underground from twitter. vx-staff: if you want me to take it down, pm me i'm not using to impersonate you!
@adhsec.bsky.social
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (❤️program/code analysis)🐞🔍 @adhsec on hellsite, they/them, enby, #AuDHD
@c1truz.bsky.social
Security Engineer, interested in macOS malware, Virtualization and Embedded Linux. Working in the fruit business.
@mrphrazer.bsky.social
Binary Security Researcher, Chief Scientist at http://emproof.com and Trainer. Website: https://synthesis.to
@nicolo.dev
Reverse Engineer – Passion for decompiler, disassembler, and anything that breaks software Blog: https://nicolo.dev
@vxundergroundre.bsky.social
The largest collection of malware source code, samples, and papers on the internet. Password: infected (unofficial, this is a bot! Maintained by @yjb.bsky.social, the bot can't handle retweets, video, and maybe a few other things)
@mrexodia.bsky.social
and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
@n3mes1s.bsky.social
An Operating System lover, was EDR chef and purple teamer. Trying to replace myself with an Agentic AI.
@matteomalvica.bsky.social
content dev and researcher @offsectraining | r&d @OutflankNL | 🥁 www.uf0.org
@rmettig.com
Researcher and PhD student at LSU. Malware, memory forensics, reverse engineering, macOS, ICS/OT. Music nerd and concert junkie. Personal account. rmettig.github.io/about
@0xdeadbeefjerky.com
Detection Engineer @ Meta Former Security Engineer @Lacework, Red Teamer @ Meta and security consultant
@timdbg.com
OS/systems engineer, co-founder of Augmend. I used to work on WinDbg at Microsoft. Also on mastodon/fediverse as @[email protected]
@threatintel.microsoft.com
We are Microsoft's global network of security experts. Follow for security research and threat intelligence. https://aka.ms/threatintelblog
@bbaskin.bsky.social
Just someone that dabbles in threat research, malware analysis, RE, incident response, CTFs, and old school forensics. Apologetic ginger.
@nyx-o.bsky.social
Malware Researcher - Security enthusiast - curiosity is not a crime. Locking up knowledge and culture however is.
@goretsky.bsky.social
@ESET Distinguished Researcher | alum of McAfee, Microsoft MVP, Tribal Voice, Zultys | Mod @Lenovo, @Neowin.Net, Scots Newsletter forums | Intel Insider Council | Repost ≠ endorse
@snoffle.bsky.social
Dad. Husband. Threat researcher at Crosspoint Labs. He/Him. Maintainer of the Virus History Project. #infosec #cats #nature #science #art #antifascist #drawing #istandwithukraine
@tuberlin.bsky.social
Official Bluesky Account of #TUBerlin. 🚀 We’ve got the brains for the future. For the benefit of society. 📰 News: https://www.tu.berlin/en/news 🔑 Data Privacy: https://www.tu.berlin/en/communication/news/social-media/data-privacy-policy-for-social-medi
@silentpush.bsky.social
Know First. Preemptive Cyber Intelligence with Indicators of Future Attack™. Join the Community today: explore.silentpush.com/register
@ajking.io
Threat Research at SnapAttack now part of Splunk now part of Cisco / Detection Engineering / Dad | #DetectionEngineering #ThreatHunting #PurpleTeam | Header art from http://art.vx-underground.org.
@synacktiv.com
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
@alexplaskett.bsky.social
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
@wxs.bsky.social
Working at Google TAG. Retired FreeBSD committer. May or may not be a robot.
@falconforce.nl
Building a resilient digital society through highly specialised digital security consulting.
@emericnasi.bsky.social
CyberSecurity researcher and founder of BallisKit. I have a passion for all infosec subjects especially redteam and writing offensive tools!