@podalirius.bsky.social
Security Researcher & Speaker | Microsoft Security MVP | Developer of security tools | Coach of the CTF team @OteriHack 🎬 http://youtube.com/c/Podalirius
@affine.group
Researcher in Cryptography (symmetric-key, white-box, post-quantum, etc.) https://affine.group
@carrot-c4k3.bsky.social
cyber torture pioneer. pwn2own 2024 winner. hacking, shitposting, politics. en/ru. she/her 🏳️⚧️
@rebane2001.bsky.social
🇪🇪🏳️⚧️ | Archivist | 8 CVEs in Chrome | MapartCraft | Horse | rebane2001#3716 | Lyra 🦊 she/her https://lyra.horse/ @[email protected]
@lina.yt
Hello everyone, Asahi Lina here! I'm a developer VTuber! ▶️ lina.yt/magic EN/日本語|she/her|🎨 #AsahiLinArt My gf: @cyan.yt 🩵|We are @thgirls.yt Model x.com/NananoNanase Design x.com/shiranui_illust PFP @merryhime.bsky.social 📨 [email protected]
@hyprdude.bsky.social
vuln researcher+exploit dev | bordeaux enjoyer | friend of all cats | him/he | https://blog.coffinsec.com
@maldr0id.bsky.social
Military-grade reverse engineer @ Google, working on Android malware Got mistaken for a member of Project Zero once. Everything here is my own opinion he/him ✨🌈🦄
@retr0.id
reverse engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time Fedi: @[email protected] Macroblog: https://www.da.vidbuchanan.co.uk/blog/
@ionescu.bsky.social
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker. Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
@saelo.bsky.social
V8 Security technical lead. Previously Project Zero. Phrack author. Personal account.
@stacksmashing.bsky.social
Security researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of hextree.io. Contact: [email protected]
@tiraniddo.dev
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
@434b.bsky.social
Vulnerability researcher | Fuzzing | Anything low-level excites me | Admin @ https://0x00sec.org | My tweets are my own | Blog: https://0x434b.dev
@bellingcat.com
Bellingcat is an independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research. Want to support our charity? bellingcat.com/donate
@jackrhysider.bsky.social
Creator of Darknet Diaries. Verification: https://twitter.com/JackRhysider/status/1675298532406984707
@gynvael.bsky.social
Security researcher/programmer ⁂ Managing director @ HexArcana ⁂ @DragonSectorCTF founder ⁂ he/him
@offensivecon.bsky.social
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
@lcamtuf.coredump.cx
Substack: http://lcamtuf.substack.com/archive Homepage: http://lcamtuf.coredump.cx
@azeria-labs.com
Founder of Azeria Labs, Trainer, Author of Blue Fox: Arm Assembly Internals & Reverse Engineering
@richinseattle.bsky.social
Fuzzing; Vulnerability Research; Deep Learning; Reverse Engineering Training & Publications @ http://fuzzing.io Hacking the planet since 1995 Undercurrents.io BOFH I'll stop the world and melt with you
@maddiestone.bsky.social
Security Researcher at Google Project Zero. 0-days all day. Love all things reverse engineering. she/her
@liveoverflow.bsky.social
wannabe hacker... he/him 🌱 grow your hacking skills https://hextree.io
@bsky.app
official Bluesky account (check username👆) Bugs, feature requests, feedback: [email protected]