@tomnomnom.com
Open-source tool maker/hacker. Author of gron, anew, and a dozen dinky security tools. He/him. Tools: http://github.com/tomnomnom @TomNomNom on the other site
@stephenfewer.bsky.social
Principal Security Researcher at @rapid7.com. Decompiler dev for Relyze. Core Metasploit dev 2009 - 2013. MSRC Top 100 2015. Pwn2Own 2011, 2021, 2024. stephenfewer.github.io
@xenokovah.bsky.social
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of OpenSecurityTraining2 https://ost2.fyi
@cxx.dev
C++ developer specializing in source and binary program analysis and transformation.
@affine.group
Researcher in Cryptography (symmetric-key, white-box, post-quantum, etc.) https://affine.group
@yossarian.net
skeeting in accordance with the universal law. yossarian.net / blog.yossarian.net
@pietroborrello.bsky.social
Security Researcher | PhD Alumn at @SapienzaRoma | Pwner at @TheRomanXpl0it and @mhackeroni | https://infosec.exchange/@pietroborrello
@carste1n.bsky.social
Security Engineer @ Cloudflare, ex-Google ISE, I use bad software and bad machines for the wrong things. My writing: https://carstein.github.io
@rh0main.bsky.social
Security engineer working on Android, reverse-engineering & obfuscation. https://www.romainthomas.fr/ - https://obfuscator.re/ - https://lief.re
@stacksmashing.bsky.social
Security researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of hextree.io. Contact: [email protected]
@dmnk.bsky.social
【DΞCOMPILΞ NΣVΞR】 Android Red Team @google Fuzzing @aflplusplus.bsky.social CTF @enoflag (opinions my own)
@nyanbox.stackchk.fail
aka itszn (itszen) 0xffff000041414141 Security researcher creating pwnable puzzles https://infosec.exchange/@nyanbox https://x.com/itszn13 LLM Art: https://bsky.app/profile/alternet.site
@bellingcat.com
Bellingcat is an independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research. Want to support our charity? bellingcat.com/donate
@saelo.bsky.social
V8 Security technical lead. Previously Project Zero. Phrack author. Personal account.
@tiraniddo.dev
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
@pr0me.bsky.social
Firmware Security • Embedded Systems • AI x Infosec • Researcher @binarly • PhD Candidate @TUBerlin • Capturing Flags with ENOFLAG
@novafacing.bsky.social
Security @ MORSE, v0.1.0 security tools on GitHub 🏳️🌈 @[email protected]
@richinseattle.bsky.social
Fuzzing; Vulnerability Research; Deep Learning; Reverse Engineering Training & Publications @ http://fuzzing.io Hacking the planet since 1995 Undercurrents.io BOFH I'll stop the world and melt with you
@xorpse.ghost.sh
Program Analysis / Reverse Engineering Chief Scientist @ BINARLY Website: https://xv.ax