Lukas Arnold
Researching iOS' Cellular Protocol Stack @ SEEMOO
Studying CS @tuda.bsky.social
🌍 https://lukasarnold.de
@andreaszeller.bsky.social
Software researcher at https://cispa.de, working on #Fandango, #S3, #FuzzingBook, #DebuggingBook. Testing, debugging, analyzing, and protecting software for a better world. Find me at https://andreas-zeller.info/
@novafacing.bsky.social
Security @ MORSE, v0.1.0 security tools on GitHub 🏳️🌈 @novafacing@haunted.computer
@adrianherrera.bsky.social
Security researcher with a penchant for programming language theory. Building fuzzers @interruptlabs.bsky.social. https://adrianherrera.github.io/
@moyix.net
AI researcher at XBOW, Associate Professor @ NYU Tandon (on leave). Security, RE, ML. PGP http://keybase.io/moyix/ Founder of the MESS Lab: http://messlab.moyix.net
@434b.bsky.social
Vulnerability researcher | Fuzzing | Anything low-level excites me | Admin @ https://0x00sec.org | My tweets are my own | Blog: https://0x434b.dev
@carste1n.bsky.social
Security Engineer @ Cloudflare, ex-Google ISE, I use bad software and bad machines for the wrong things. My writing: https://carstein.github.io
@mu00d8.bsky.social
Postdoctoral researcher in the SEFCOM lab @ASU; prev @CISPA Helmholtz Center and @RUB; interested in Systems Security / Program Analysis / Fuzzing
@pr0me.bsky.social
Firmware Security • Embedded Systems • AI x Infosec • Researcher @binarly • PhD Candidate @TUBerlin • Capturing Flags with ENOFLAG
@adhsec.bsky.social
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (❤️program/code analysis)🐞🔍 @adhsec on hellsite, they/them, enby, #AuDHD
@hatr.bsky.social
reporter covering cyber (both crime and state-sponsored) for Der Spiegel and ZDF, short overview at https://linktr.ee/hakantanriverdi
@digitalcold.bsky.social
Android and baseband vulnerability researcher. Computer engineering PhD. 🇺🇸 (Washington, DC) || https://hernan.de/z
@perehmen.bsky.social
KDE, mobile security, trains, and others. Account of @pheremen.bsky.social not in Korean. Posts are my own, does not reflect the opinion of my employer. Twitter @ad_ili_rai_en. Also available in @peremen@chaos.social
@aflplusplus.bsky.social
We want to make fuzzing better and better Follow for updates on AFL++ & LibAFL
@andreafioraldi.bsky.social
Cyber Response Italian Supercazzola Technology Officer at @mhackeroni Inc. Writing your favourite fuzz testing tools with @aflplusplus. Security research at .
@rmondello.com
💚 Friend 🏳️⚧ Trans, nonbinary, they/them 😷 Caring, careful 🔑 Pass{keys, codes, words} 🧛🏻♀️ It’s not a phase 🦔 Speedrunner
@linuzifer.bsky.social
Ein Teil von jener Kraft, die stets das Böse will und stets das Gute schafft. @linuzifer@23.social http://linus-neumann.de
@stacksmashing.bsky.social
Security researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of hextree.io. Contact: contact@stacksmashing.net
@liveoverflow.bsky.social
wannabe hacker... he/him 🌱 grow your hacking skills https://hextree.io
@soenke.d-64.social
Privacy Researcher based in Göttingen, Germany, previously working on Kernel Fuzzing @ TU Darmstadt.
@signal.org
Signal is an end-to-end encrypted messaging app. Privacy isn’t an optional mode, it’s just the way that Signal works. Every message, every call, every time.
@jsrailton.bsky.social
Chasing digital badness. Senior Researcher at Citizen Lab, but words here are mine.
@lilithwittmann.bsky.social
staatl. zertifizierte Krawallinfluencerin & Sicherheitsforscherin https://links.lilithwittmann.de
@doublepulsar.com
cybersecurity weather person. @gossithedog before Elon ruined everything
@citizenlab.ca
Research and development at the intersection of cyberspace, global security, and human rights. Based at Munk School of Global Affairs & Public Policy, University of Toronto.
@vxundergroundre.bsky.social
The largest collection of malware source code, samples, and papers on the internet. Password: infected (unofficial, this is a bot! Maintained by @yjb.bsky.social, the bot can't handle retweets, video, and maybe a few other things)
@zackwhittaker.com
Security editor, TechCrunch Signal: zackwhittaker.1337 mastodon.social/@zackwhittaker this.weekinsecurity.com
@meredithmeredith.bsky.social
President of Signal, Chief Advisor to AI Now Institute
@gergely.pragmaticengineer.com
Writing The Pragmatic Engineer (@pragmaticengineer.com), the #1 technology newsletter on Substack. Author of The Software Engineer's Guidebook (engguidebook.com). Formerly at Uber, Skype, Skyscanner. More at pragmaticengineer.com
@offensivecon.bsky.social
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
@basicappleguy.com
Basic (ˈbeɪ.sɪk’; Adj): lover of all things mainstream, popular, & trending in the world of .
@badinternet.oracularhades.com
run by @oracularhades.com | @ or DM this account with suggestions
@troyhunt.com
Creator of Have I Been Pwned. Microsoft Regional Director. Pluralsight author. Online security, technology and “The Cloud”. Australian.
@coolstar.bsky.social
iOS app & Windows kernel developer. Ex-jailbreaker from San Francisco Bay Area, CA
@404media.co
it's a website (and a podcast, and a newsletter) about humans and technology, made by four journalists you might already know. like and subscribe: 404media.co
@mboehme.bsky.social
Software Security @MPI, PhD @NUS, Dipl.-Inf. @TUDresden. Research Group: http://mpi-softsec.github.io
@naehrdine.bsky.social
ɿɘɘniϱnɘ ɘƨɿɘvɘɿ 🎦 youtube.com/@jiskac 📝 naehrdine.blogspot.com 🐥 twitter.com/naehrdine 🎓 hpi.de/classen 📱 reversing.training
@anamy.gay