@bakbakbak.bsky.social
@phenol42.bsky.social
Former chemistry student. 42born2code alumni. Reversing and pwning stuffs at RandoriSec.
@flutsunami-is-aska.bsky.social
Former RE team lead @synacktiv - Former @AirbusSecLab lead Collector of Quote
@pilvar.bsky.social
CTF w/ organizers and polygl0ts | ECSC swiss team & ICC team EU 24 | CS student @ EPFL
@alexplaskett.bsky.social
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
@adhsec.bsky.social
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (❤️program/code analysis)🐞🔍 @adhsec on hellsite, they/them, enby, #AuDHD
@yofbalibump.bsky.social
@mtalbi.bsky.social
@blackndoor.bsky.social
@angelkillah.bsky.social
@pwntester.bsky.social
Security Researcher with @GHSecurityLab. CTF #int3pids. Opinions here are mine!
@mathishammel.bsky.social
Programmation compétitive, cybersécurité & IA. Co-fondateur & CTO @agoratlas.com, agence d'analyse des réseaux sociaux à grande échelle.
@bienai.me
@thezdi.bsky.social
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
@zeecka.bsky.social
Security Researcher - #OSCP #OSWE - Former @ENSIBS, CTF Player, @AperiKube member, Author of http://aperisolve.com
@reverseth.bsky.social
French pentester, but currently traveling around the world. Passionate about hacking, I also enjoy building things with Rust.
@synacktiv.com
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
@cleptho.bsky.social
Offensive Security | Вічна пам'ять / Вечная память https://twitter.com/cleptho | https://infosec.exchange/@cleptho
@nyanbox.stackchk.fail
aka itszn (itszen) 0xffff000041414141 Security researcher creating pwnable puzzles https://infosec.exchange/@nyanbox https://x.com/itszn13 LLM Art: https://bsky.app/profile/alternet.site
@mhackeroni.bsky.social
Italian CTF team. DEF CON finalists. Cyber. Pasta. And now even satellites?! ✉️ info@mhackeroni.it
@aumasson.jp
https://aumasson.jp cofounder & CSO @ taurushq.com cryptographer (BLAKE2, BLAKE3, SipHash) author of Serious Cryptography https://nostarch.com/serious-cryptography-2nd-edition and other books Signal: jpa.01
@blackhoodie.bsky.social
Blackhoodie is a free, women-only reverse engineering workshop. Check our website for infos! #BHRE Web: https://blackhoodie.re & Donate: https://donate.stripe.com/9AQaGq3Ho6084aAdQQ
@mohansrk.bsky.social
Founder @ElectrovoltSec Browser and Web Security @cure53berlin, Blockchain Security @osec_io, Rambling on http://mohansrkp.substack.com
@mizu.re
About me? | Website: https://mizu.re | Tool: https://github.com/kevin-mizu/domloggerpp | Teams: @rhackgondins, @FlatNetworkOrg, @ECSC_TeamFrance | From: https://twitter.com/kevin_mizu
@sirdarckcat.bsky.social
@carste1n.bsky.social
Security Engineer @ Cloudflare, ex-Google ISE, I use bad software and bad machines for the wrong things. My writing: https://carstein.github.io
@aflplusplus.bsky.social
We want to make fuzzing better and better Follow for updates on AFL++ & LibAFL
@andreafioraldi.bsky.social
Cyber Response Italian Supercazzola Technology Officer at @mhackeroni Inc. Writing your favourite fuzz testing tools with @aflplusplus. Security research at .
@karion23.bsky.social