CTfer @ctftime ,(wanna-be) zeroday security researcher, (wanna-be) security engineer
vulnerability researcher · reverse engineer · Ⓥ🌱
https://0xff.re/
A next-generation code editor that enables high-performance collaboration with AI and your team.
zed.dev
cyber torture pioneer. pwn2own 2024 winner. hacking, shitposting, politics. en/ru. she/her 🏳️⚧️
Rust dev, Electronics engineer, Author, RustNL, RustWeek organizer, ADHD, Polyamorous, Lesbian, She/Her
Native Hawaiian Hacker | Prev Co-captain of @Shellphish | PhD Student in Comp Sci @ASU l Decompiler Research | https://mahaloz.re
Researcher, Computer Security @ ICSI
Chief Mad Scientist @ Skerry Technologies
Putting the Science in "Mad Science"
Digital, Explainable, and (usually) Adversarial Systems
Looking for employment: CV is here https://skerry-tech.com/cv.html
he/him
Real-time historian of the late cyber capitalist era @TechCrunch, writing about the intersection of hackers, human rights, and spies.
Also writing a book about Hacking Team and the history of government spyware.
☎️ Signal: +1 917 257 1382
https://binary.ninja/
Made with ❤️ by https://vector35.com/
reverse engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time
Fedi: @retr0id@retr0.id
Macroblog: https://www.da.vidbuchanan.co.uk/blog/
https://re-verse.io/ reverse engineering conference
CTO of Microsoft Azure, author of novels Rogue Code, Zero Day and Trojan Horse, Windows Internals, Sysinternals tools. Opinions are my own.
since 1985
https://phrack.org
Securing every bit of your data
https://quarkslab.com
A circus artist with a visual studio license
Principal Intelligence Analyst @ Symantec. Views are my own etc. https://keybase.io/abnev
mobile security / symbolic execution . he / him
https://github.com/blacktop
Computer Friend, Not a Bird
www.philipzucker.com
Working on Project Zero, Big Sleep, and V8 Security. Personal account.
Firmware Security • Embedded Systems • AI x Infosec •
Researcher @binarly • PhD Candidate @TUBerlin •
Capturing Flags with ENOFLAG
wannabe hacker... he/him
🌱 grow your hacking skills https://hextree.io
Security Engineer @ Cloudflare,
ex-Google ISE,
I use bad software and bad machines for the wrong things.
My writing: https://carstein.github.io
Vulnerability researcher | Fuzzing | Anything low-level excites me | Admin @ https://0x00sec.org | My tweets are my own | Blog: https://0x434b.dev
AI researcher at XBOW. Security, RE, ML. PGP http://keybase.io/moyix/
We want to make fuzzing better and better
Follow for updates on AFL++ & LibAFL
Security researcher with an interest in formal methods.
B̶u̶i̶l̶d̶i̶n̶g̶ breaking things @ Interrupt Labs |
Teaching @ Australian National University
https://adrian-herrera.com
Cyber Response Italian Supercazzola Technology Officer at
@mhackeroni Inc. Writing your favourite fuzz testing tools with
@aflplusplus. Security research at .
Fuzzing & stuff https://hexgolems.com
Security @Google, Personal Account.
fuzzing enjoyer
@novafacing@haunted.computer
"I'm interested in all kinds of astronomy."
https://scrapco.de
Mostly cross-posting from Fediverse: @buherator@infosec.place
Software Security @ MPI for Security and Privacy
Spokesperson for Max Planck Research Group Leads at CPTS
PhD @NUS, Dipl.-Inf. @TUDresden
Research Group: http://mpi-softsec.github.io
Fuzzing; Vulnerability Research;
Deep Learning; Reverse Engineering
Training & Publications @ http://fuzzing.io
Hacking the planet since 1995
Undercurrents.io BOFH
I'll stop the world and melt with you
Substack: http://lcamtuf.substack.com/archive
Homepage: http://lcamtuf.coredump.cx
Former biologist. Actual PhD in genetics. Security at Nvidia, OS security teaching at https://www.ischool.berkeley.edu.
Blog: https://codon.org.uk/~mjg59/blog
Signal: @mjg.59
He/him
Advancing the power of facts, globally 🌎
Android Vulnerability Researcher (0C). 0xACED. Ex-Apple. Posts are my own.
CTO, software, code archaeology, security, mobile apps, startups, NP Hard, AI things
Austin Powered. OpenStack co-founder, OpenInfra Foundation COO, ex Rackspace & Yahoo! open source for fun & profit.
Open Source AI early and often
@sparkycollier on twitter and elsewhere
Links: markcollier.me
https://cyllective.com
https://volery.org
android/linux kernel @ Vigilant Labs | ctfs (pwn) w/ CoR + ELT
Security engineer working on Android, reverse-engineering & obfuscation.
https://www.romainthomas.fr/ - https://obfuscator.re/ - https://lief.re
【DΞCOMPILΞ NΣVΞR】
Android Red Team @google
Fuzzing @aflplusplus.bsky.social
CTF @enoflag
(opinions my own)
Offensive Security | Вічна пам'ять / Вечная память
https://twitter.com/cleptho | https://infosec.exchange/@cleptho
Hermetic Initiate. Exploring conscience and the nature of reality. I also hack things.
Berlin. Does things with computers and phones.
Author of @radareorg, mainly active in the fediverse @pancake@infosec.exchange
Your story. Your platform. Follow our live coverage on aljazeera.com
Breaking news and developing stories from the U.S. and around the world
Asking the hard questions and bringing unique perspectives from across the globe. This is CNN.
reverse engineering, retrocomputing, punk music, iOS, Frida, Radare2
Security Researcher with @GHSecurityLab. CTF #int3pids. Opinions here are mine!
Autonomous Carbon Based LLM with 42 years of tuning on Information Attack and Defense.
Host of CanSecWest, and PacSec.
Security audits, code, IR, LLM, red team consulting.
Specialize in Firmware, and RF.
VA7MOV
Destroyer of dreams. Maintainer of dissident's shitty code. Clutch Developer. Security & Tech mainly, with a hint of personal rage.
learning about brains + internet archiving ⑊ aka @theSquashSH on X ⑊ @ArchiveBox.io ⑊ 🚴♂️🏍🎵🗻 ⑊ 沪老外 ⑊ past: @MonadicalHQ, @RecurseCenter '14
ɿɘɘniϱnɘ ɘƨɿɘvɘɿ
🎦 youtube.com/@jiskac
📝 naehrdine.blogspot.com
🐥 twitter.com/naehrdine
🎓 hpi.de/classen
📱 reversing.training
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (❤️program/code analysis)🐞🔍 @adhsec on hellsite, they/them, enby, #AuDHD