Baptiste Devigne | Bug Bounty Hunter | Most Impactful Team H1-0131 (AWS) | Eradicator H1-6102 (Salesforce)
🔗My blog https://gelu.chat/
Hunting pokemons for a living @exatrack.bsky.social
Security enthusiast
https://twitter.com/stalkr_
https://mastodon.social/@StalkR
https://infosec.exchange/@StalkR
Security enthusiast: RE, VR, exploits and stuff
Security expert @Synacktiv
About me?
| Website: https://mizu.re
| Tool: https://github.com/kevin-mizu/domloggerpp
| Teams: @rhackgondins, @FlatNetworkOrg, @ECSC_TeamFrance
| From: https://twitter.com/kevin_mizu
Security researcher @Synacktiv.com ⛩️
Reverse @ Synacktiv | CTF w/ TFNS
Organizer of HeroCTF || ctf w/ FlatNetworkOrg || TeamFR 2021 & 2022 🇫🇷 || 🥷 Synacktiv
Ninja reverser at @Synacktiv.com
cybersecurity weather man. scanning the horizons for cloudy cyber. Expert at nothing except computer rubbish. Anti-ransomware since 2015.
TrendAI Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
VR team tech lead @synacktiv.com
Former RE team lead
@synacktiv - Former @AirbusSecLab lead
Collector of Quote
IT & Hacking https://xark.es/
Reverse engineer @synacktiv.com. I appreciate Android related stuff
#RE #Pwn #FPV ~ Learning is endless ~ 🇫🇷 ~ @Synacktiv.com
Security expert @Synacktiv
Researching iOS' Cellular Protocol Stack @ SEEMOO
Studying CS @tuda.bsky.social
🌍 https://lukasarnold.de
Security Researcher @neodyme.io | CTF, Fuzzing, Embedded Security
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (❤️program/code analysis)🐞🔍 @adhsec on hellsite, they/them, enby, #AuDHD
0day Researcher @ ████████████ / Baker / 0wl
// I post random things on here
Security researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of
hextree.io. Contact: contact@stacksmashing.net
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
Android Vulnerability Researcher (0C). 0xACED. Ex-Apple. Posts are my own.
Android Security Researcher @ Cellebrite
A circus artist with a visual studio license
VR @ Synacktiv, low level security enthusiast
https://voydstack.re/
vulnerability researcher · reverse engineer · Ⓥ🌱
https://0xff.re/
Usual mood: confused. Ingénierie à rebours & endless home renovation. I always enjoy a good walk down the page tables. He/him.
Mastodon: @laomaiweng@infosec.exchange
Twitter/X: @laomaiweng
Someone who likes debuggers a bit too much
🇨🇦 • 🇰🇷 • 🇫🇷
Binary Security Researcher & Trainer
Website: https://synthesis.to
Substack: http://lcamtuf.substack.com/archive
Homepage: http://lcamtuf.coredump.cx
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker.
Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
since 1985
https://phrack.org
Working on Project Zero, Big Sleep, and V8 Security. Personal account.
hacker, poster, weird machine mechanic
https://chompie.rip
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
Security researcher/programmer ⁂ Managing director @ HexArcana ⁂ @DragonSectorCTF founder ⁂ he/him
Security @Google, Personal Account.
android/linux kernel @ Vigilant Labs | ctfs (pwn) w/ CoR + ELT
Continuously learning about computer security through research and development.
Technologist at Amnesty's Security Lab. Here's how to contact me securely: https://gist.github.com/DrWhax/61978d4e7df5291d4cf308f10dc20d5a
Links related to Linux kernel security and exploitation.
Maintained by @andreyknvl.bsky.social and Alexander Popov.
Also on https://t.me/linkersec, https://x.com/linkersec, and https://infosec.exchange/@linkersec.
pwning kernels & blogging on os internals 🌱
I play with vulnerabilities and exploits.
While this site initially showed promise, I've grown tired with its lack of improvement.
You'll find me @wdormann@infosec.exchange on Mastodon.
Pentest & Windows security research
The official https://appleinsider.com account.
Apple news and rumors since 1997.
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
Offensive security conference in the heart of Paris. 10-11th October 2025
https://www.hexacon.fr/
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.