@stacksmashing.bsky.social
Security researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of hextree.io. Contact: contact@stacksmashing.net
@tiraniddo.dev
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
@adhsec.bsky.social
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (❤️program/code analysis)🐞🔍 @adhsec on hellsite, they/them, enby, #AuDHD
@phenol42.bsky.social
Former chemistry student. 42born2code alumni. Reversing and pwning stuffs at RandoriSec.
@lukasarnld.bsky.social
Researching iOS' Cellular Protocol Stack @ SEEMOO Studying CS @tuda.bsky.social 🌍 https://lukasarnold.de
@hyprdude.bsky.social
vuln researcher+exploit dev | bordeaux enjoyer | friend of all cats | him/he | https://blog.coffinsec.com
@liveoverflow.bsky.social
wannabe hacker... he/him 🌱 grow your hacking skills https://hextree.io
@cleptho.bsky.social
Offensive Security | Вічна пам'ять / Вечная память https://twitter.com/cleptho | https://infosec.exchange/@cleptho
@maddiestone.bsky.social
Security Researcher at Google Project Zero. 0-days all day. Love all things reverse engineering. she/her
@saelo.bsky.social
V8 Security technical lead. Previously Project Zero. Phrack author. Personal account.
@mtalbi.bsky.social
@angelkillah.bsky.social
@flutsunami-is-aska.bsky.social
Former RE team lead @synacktiv - Former @AirbusSecLab lead Collector of Quote
@hash-miser.bsky.social
Internet janitor, #CERT #BlueTeam and Whisk(e)y enthusiast "Everything you do is useless ! Enjoy 🍻" hash_miser@infosec.exchange
@synacktiv.com
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
@laomaiweng.bsky.social
Usual mood: confused. Ingénierie à rebours & endless home renovation. I always enjoy a good walk down the page tables. He/him. Mastodon: @laomaiweng@infosec.exchange Twitter/X: @laomaiweng
@thezdi.bsky.social
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
@ionescu.bsky.social
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker. Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
@maldr0id.bsky.social
Military-grade reverse engineer @ Google, working on Android malware Got mistaken for a member of Project Zero once. Everything here is my own opinion he/him ✨🌈🦄
@malwaretech.com
Cybersecurity Specialist, Public Speaker, Ex-Hacker. https://marcushutchins.com
@meredithmeredith.bsky.social
President of Signal, Chief Advisor to AI Now Institute
@k8em0.bsky.social
Founder & CEO LutaSecurity @payequitynow MIT&Harvard visiting scholar, @MasonNatSec fellow, 1/2 Chamoru, 1/2 Greek all-American hacker
@agreenberg.bsky.social
Writer for WIRED. Author of SANDWORM. New book, TRACERS IN THE DARK: The Global Hunt for the Crime Lords of Cryptocurrency, out now. agreenberg@wired.com. Andy.01 on Signal.
@lorenzofb.bsky.social
Real-time historian of the late cyber capitalist era @TechCrunch. Tweets about infosec, surveillance by day. 🍕, ⚽️, 🎸, 🎮 by night. ☎️ Signal: +1 917 257 1382 Past lives: VICE Motherboard, Mashable, WIRED.
@doublepulsar.com
cybersecurity weather person. @gossithedog before Elon ruined everything
@runasand.bsky.social
Founder of Granitt, securing journalists and at-risk people around the world.
@kimzetter.bsky.social
Journalist - cyber/natn'l security. Speaker. Author - COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World's First Digital Weapon Signal: KimZ.42 https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196 https://www.zetter-zeroday.com