@nostarchpress.bsky.social
The finest in geek entertainment. Email us: info@nostarch.com We're live M-F, 7am-6pm PDT https://nostarch.com/
@linkersec.bsky.social
Links related to Linux kernel security and exploitation. Maintained by @andreyknvl.bsky.social and Alexander Popov. Also on https://t.me/linkersec, https://x.com/linkersec, and https://infosec.exchange/@linkersec.
@andreyknvl.bsky.social
Security engineer at http://xairy.io. Focusing on the Linux kernel. Maintaining @linkersec.bsky.social. Trainings at http://xairy.io/trainings.
@sureworkshop.bsky.social
The Workshop on Software Understanding and Reverse Engineering (SURE). Co-located at ACM CCS 2025 in Taiwan. https://sure-workshop.org/
@rust-lang.org
A programming language empowering everyone to build reliable and efficient software.
@gabriel-sherman.bsky.social
Ph.D. Student at the University of Utah | Computer Security https://gabe-sherman.github.io/
@snagycs.bsky.social
Faculty @utah.edu. My lab hunts bugs: https://futures.cs.utah.edu/bugs. Mastodon: snagy@infosec.exchange Twitter: @snagycs
@galoisinc.bsky.social
galois.com For nearly 25 years, Galois has combined mathematical rigor with curious creativity to cut through complexity and guarantee trustworthiness in the world’s most critical systems.
@binarly.bsky.social
⛓️Binarly is the world’s most advanced automated software supply chain security platform.
@434b.bsky.social
Vulnerability researcher | Fuzzing | Anything low-level excites me | Admin @ https://0x00sec.org | My tweets are my own | Blog: https://0x434b.dev
@mahal0z.bsky.social
Native Hawaiian Hacker | Prev Co-captain of @Shellphish | PhD Student in Comp Sci @ASU l Decompiler Research | https://mahaloz.re
@foundryzero.co.uk
We're a specialised supplier providing cyber security research, engineering services and training.
@bsideslondon.bsky.social
14th Dec 24 @ Novotel London West Building security from the grassroots. Annual security conference built & delivered by the local community for the community. Web: https://BSides.London Twitter: https://x.com/BSidesLondon
@lukasarnld.bsky.social
Researching iOS' Cellular Protocol Stack @ SEEMOO Studying CS @tuda.bsky.social 🌍 https://lukasarnold.de
@bufferbuster.bsky.social
Developer of Binary Ninja, experimenter with a vast multitude of unfinished side projects
@adrianherrera.bsky.social
Security researcher with a penchant for programming language theory. Building fuzzers @interruptlabs.bsky.social. https://adrianherrera.github.io/
@pagedout.bsky.social
Paged Out! is a free magazine about programming, hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics. Always accepting submissions of one-page articles.
@jonpalmisc.bsky.social
Software engineer & security researcher. Present: iOS research. Past: Binary Ninja developer at Vector 35. Also at https://infosec.exchange/@jonpalmisc & https://twitter.com/jonpalmisc. https://jonpalmisc.com
@jevinskie.bsky.social
KEYWORDS ➡︎ cats, hacking, reverse engineering, llvm, binary analysis, side channel analysis, FPGAs, NFC/EMV tricks Previously Pay Security he/him
@llvmweekly.org
A weekly email newsletter on developments in LLVM, Clang and related projects. Curated by @asbradbury.org
@zardus.bsky.social
Retired DEFCON CTF org. Shellphish Captain Emeritus. ASU Prof. angr hacker. pwn.college sensei. Looking for students/interns! https://yancomm.net https://github.com/zardus https://defcon.social/@Zardus
@stacksmashing.bsky.social
Security researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of hextree.io. Contact: contact@stacksmashing.net
@pr0me.bsky.social
Firmware Security • Embedded Systems • AI x Infosec • Researcher @binarly • PhD Candidate @TUBerlin • Capturing Flags with ENOFLAG
@mu00d8.bsky.social
Postdoctoral researcher in the SEFCOM lab @ASU; prev @CISPA Helmholtz Center and @RUB; interested in Systems Security / Program Analysis / Fuzzing
@liveoverflow.bsky.social
wannabe hacker... he/him 🌱 grow your hacking skills https://hextree.io
@naehrdine.bsky.social
ɿɘɘniϱnɘ ɘƨɿɘvɘɿ 🎦 youtube.com/@jiskac 📝 naehrdine.blogspot.com 🐥 twitter.com/naehrdine 🎓 hpi.de/classen 📱 reversing.training
@alexplaskett.bsky.social
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
@mboehme.bsky.social
Software Security @MPI, PhD @NUS, Dipl.-Inf. @TUDresden. Research Group: http://mpi-softsec.github.io
@andreaszeller.bsky.social
Software researcher at https://cispa.de, working on #Fandango, #S3, #FuzzingBook, #DebuggingBook. Testing, debugging, analyzing, and protecting software for a better world. Find me at https://andreas-zeller.info/
@henrichlauko.bsky.social
Compilers at Trail of Bits ~ VAST: MLIR frontend for C++ ~ Program Analysis
@rh0main.bsky.social
Security engineer working on Android, reverse-engineering & obfuscation. https://www.romainthomas.fr/ - https://obfuscator.re/ - https://lief.re
@synacktiv.com
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
@gynvael.bsky.social
Security researcher/programmer ⁂ Managing director @ HexArcana ⁂ @DragonSectorCTF founder ⁂ he/him
@offensivecon.bsky.social
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
@krismicinski.bsky.social
kmicinski.com Interested in automated reasoning, static analysis, and logic programming and literally nothing else.
@cxx.dev
C++ developer specializing in source and binary program analysis and transformation.
@aflplusplus.bsky.social
We want to make fuzzing better and better Follow for updates on AFL++ & LibAFL
@andreafioraldi.bsky.social
Cyber Response Italian Supercazzola Technology Officer at @mhackeroni Inc. Writing your favourite fuzz testing tools with @aflplusplus. Security research at .