TheVamp
Reversing, hacking, cracking, coding, caffeine junkie, OSCP, ALLES! - CTF Member | thevamp@infosec.exchange
@mrgretzky.breakdev.org
Offensive security tools developer. Malware developer, hobby music producer, bedroom DJ & ex-MMO game hacker. Creator of Evilginx / Bartender @ BREAKDEV RED.
@h0wlu.bsky.social
🛡️REDTEAM.PL Co-founder 🦉BlackOwlSec Founder 🧜♀️ WarCon Co-founder 👨🔬Fuzzing 🕵️Web2 & Web3 Security 🪽Angel Investor
@catc0n.bsky.social
Takes a lot of photos, calls many places home. Vulnerability research director @Rapid7.
@metasploit-r7.bsky.social
Official account of the Metasploit Project, part of the Rapid7 family. Mastodon: @metasploit@infosec.exchange Slack: http://metasploit.com/slack
@dinosn.bsky.social
Head of Threat & Vulnerability Mgmt @ Henkel AG & Co. KGaA https://t.co/NC1orlKrW3 Also at : @dinosn
@k8em0.bsky.social
Founder & CEO LutaSecurity @payequitynow MIT&Harvard visiting scholar, @MasonNatSec fellow, 1/2 Chamoru, 1/2 Greek all-American hacker
@alyssam-infosec.com
Hacker, CISO, and private pilot. Certified Bluesky Elder. Author and International Speaker, Chief advocate of #DoBetterBeBetter Compassion and empathy are traits in short supply but necessary to make this world a better place. alyssasec.com
@anke.domscheit-berg.de
Publizistin, Feministin, Netzaktivistin, 2017-2025 MdB u digitalpolitische Sprecherin für DIE LINKE im Bundestag. Weil digitale Revolution eine soziale Revolution braucht ❤️✊❤️!
@yannickboog.bsky.social
@cybrz.bsky.social
Master of Disaster @compass-security.com 🔥 for all sorts crises, scada, chunk hacking, electronics, cryptography and cyber all the things.
@amethyst.systems
Furry hacker of the dragon and Windows variety. Blog: https://amethyst.systems/blog Puzzles: https://crackmes.one/user/frank2
@naehrdine.bsky.social
ɿɘɘniϱnɘ ɘƨɿɘvɘɿ 🎦 youtube.com/@jiskac 📝 naehrdine.blogspot.com 🐥 twitter.com/naehrdine 🎓 hpi.de/classen 📱 reversing.training
@dmnk.bsky.social
【DΞCOMPILΞ NΣVΞR】 Android Red Team @google Fuzzing @aflplusplus.bsky.social CTF @enoflag (opinions my own)
@mhackeroni.bsky.social
Italian CTF team. DEF CON finalists. Cyber. Pasta. And now even satellites?! ✉️ info@mhackeroni.it
@offensivecon.bsky.social
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
@evacide.bsky.social
Director of Cybersecurity @eff.org Co-founder of @stopstalkerware.bsky.social These opinions are my own, not my employers’ I did a TED talk once
@lookitup.baby
Kubernetes SIG Security co-chair, container escape artist, aurora chaser, goose in the mainframe. Minneapolis. They/them. Stay punk 🏴 MSP feed info here: https://bsky.app/profile/lookitup.baby/post/3lapkhevr222w
@mjg59.eicar-test-file.zip
Former biologist. Actual PhD in genetics. Security at https://aurora.tech, OS security teaching at https://www.ischool.berkeley.edu. Blog: https://mjg59.dreamwidth.org Signal: @mjg.59 He/him
@hacks4pancakes.com
I am eminently qualified to speak from experience about a variety of dumpster fires. ICS DFIR at Dragos, martial artist, marksman, humanist, level 14 Neutral Good rogue, USAF retired. I post *very serious* things about infosec. Thoughts my own. Enby. 🏳️🌈
@lorenzofb.bsky.social
Real-time historian of the late cyber capitalist era @TechCrunch. Tweets about infosec, surveillance by day. 🍕, ⚽️, 🎸, 🎮 by night. ☎️ Signal: +1 917 257 1382 Past lives: VICE Motherboard, Mashable, WIRED.
@runasand.bsky.social
Founder of Granitt, securing journalists and at-risk people around the world.
@retr0.id
reverse engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time Fedi: @retr0id@retr0.id Macroblog: https://www.da.vidbuchanan.co.uk/blog/
@zardus.bsky.social
Retired DEFCON CTF org. Shellphish Captain Emeritus. ASU Prof. angr hacker. pwn.college sensei. Looking for students/interns! https://yancomm.net https://github.com/zardus https://defcon.social/@Zardus
@pagedout.bsky.social
Paged Out! is a free magazine about programming, hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics. Always accepting submissions of one-page articles.
@synacktiv.com
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
@thezdi.bsky.social
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
@citizenlab.ca
Research and development at the intersection of cyberspace, global security, and human rights. Based at Munk School of Global Affairs & Public Policy, University of Toronto.
@g33katwork.bsky.social
I like computering. Doing security research at @rapid7 labs. This is a professional account. Used to play a lot of CTF with @EatSleepPwnRpt and @StratumAuhuur
@chudypb.bsky.social
Principal Vulnerability Researcher at the watchTowr | Previously: @thezdi | https://chudypb.github.io
@compass-security.com
Penetration Testing, Red Teaming, Bug Bounty, Managed Detection, Incident Response, Digital Forensics, Security Training, Cyber Training Range
@friendlyfireexe.bsky.social
Offizieller Account von #FriendlyFire10 07.12. auf twitch.tv/Pietsmiet
@silentsignal.bsky.social
Professional Ethical Hacking Services https://blog.silentsignal.eu
@jessicalyons.bsky.social
Cybersecurity editor @theregister.com Contact me with tips: jessica.lyons@theregister.com or jess.825 on Signal Mama bear, book worm, outdoor lover, coffee and wine snob. PNW after decades in Santa Cruz but Blazers fan always.
@wdormann.infosec.exchange.ap.brid.gy
I play with vulnerabilities and exploits. I used to be https://twitter.com/wdormann but Twitter has become unbearable, so here I am. [bridged from https://infosec.exchange/@wdormann on the fediverse by https://fed.brid.gy/ ]
@shadowserver.bsky.social
Our mission is to make the Internet more secure by bringing to light vulnerabilities, malicious activity and emerging threats. Join our Alliance! https://shadowserver.org/partner
@tomnomnom.com
Open-source tool maker/hacker. Author of gron, anew, and a dozen dinky security tools. He/him. Tools: http://github.com/tomnomnom @TomNomNom on the other site
@xenokovah.bsky.social
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of OpenSecurityTraining2 https://ost2.fyi