Unlock the whole truth to build a safer future.
🌐 https://revelio.eu/
Embedded security, vulnerability researcher
Security engineer interested in reverse engineering, vulnerability exploitation & software development. Techno music enthusiast.
CTO @ Breakpoint Research
He/Him
Born at 340ppm
We make IDA, the leading tool for binary analysis, trusted by top cybersecurity teams for reverse engineering and malware defense.
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
www.interruptlabs.co.uk
Researching iOS' Cellular Protocol Stack @ SEEMOO
Studying CS @tuda.bsky.social
🌍 https://lukasarnold.de
Offensive security conference in the heart of Paris. 10-11th October 2025
https://www.hexacon.fr/
Probably mostly infosec stuff, but also anything I'd love to share
VR team tech lead @synacktiv
twitter : @epsilon_sec
web site : epsilon-sec.com
Firmware Security • Embedded Systems • AI x Infosec •
Researcher @binarly • PhD Candidate @TUBerlin •
Capturing Flags with ENOFLAG
Security researcher with an interest in formal methods.
B̶u̶i̶l̶d̶i̶n̶g̶ breaking things @ Interrupt Labs |
Teaching @ Australian National University
https://adrian-herrera.com
Compte officiel de l'Agence nationale de la sécurité des systèmes d'information (ANSSI) | Retrouvez les alertes de #cybersécurité sur le compte @cert-fr.bsky.social
Internet janitor, #CERT #BlueTeam and Whisk(e)y enthusiast "Everything you do is useless ! Enjoy 🍻" hash_miser@infosec.exchange
Red Team / Security researcher at @synacktiv.com
linktr.ee/rustyphasm
https://re-verse.io/ reverse engineering conference
Vuln Researcher | Chronic Side-Project Abandoner | Average Triathlete
https://stigward.github.io
#ActuallyAutistic | http://aassfxxx.infos.st | Turbolibéral | C'était le choix de Steins;Gate
Reverse engineering, files formats and crypto.
https://github.com/lclevy
Reverse engineer, file formats expert.
Corkami, CPS2Shock, PoC||GTFO, Sha1tered, Magika...
Security engineer @ Google. He/him.
Pentest / redteam @synacktiv.com
Compte officiel de Root-Me PRO #cybersécurité : sensibilisation, formation, ressources, événements
🔗 À propos : https://root-me.pro
🏫 Root-Me PRO EDU : https://edu.info.root-me.pro/
☠️ L'association : @rootme-org.bsky.social
Pwn2Own 20{22,23,24,24.5}, i look for 0-Days but i find N-Days & i chase oranges 🍊
https://summoning.team/
Penetration Testing, Red Teaming, Incident Response, Managed Detection, Digital Forensics, Security Training, Managed Bug Bounty, Cyber Training Range
IT & Hacking https://xark.es/
Organizer of HeroCTF || ctf w/ FlatNetworkOrg || TeamFR 2021 & 2022 🇫🇷 || 🥷 Synacktiv
Journal d'information numérique, indépendant et participatif. Seul·es nos lecteurs et lectrices peuvent nous acheter ! https://www.mediapart.fr 🖋️
Suivez aussi @mediapartblogs.bsky.social, l'espace d'expression libre des abonné·es de Mediapart.
Journaliste, aux manettes de la newsletter cybercrime Pwned | gabrielthierry@protonmail.com https://linktr.ee/gabrielthierry
Vulnerability Researcher | Exploit Developer (speaker 3x at DEF CON)
Relay Tracking News & Blogs about infosec, cybersec
- source removal/addition suggestions welcome !
CVE : check out @cve.skyfleet.blue
🆘 @skyfleet.blue
Powered by the folks at Red Team Arts!
Gallery - coming soon
redteamarts.com
https://v1k1ngfr.github.io/
Links related to Linux kernel security and exploitation.
Maintained by @andreyknvl.bsky.social and Alexander Popov.
Also on https://t.me/linkersec, https://x.com/linkersec, and https://infosec.exchange/@linkersec.
Ninja reverser at @Synacktiv.com
J'organise des CTF et (parfois) je touche de l'herbe
vulnerability researcher · reverse engineer · Ⓥ🌱
https://0xff.re/
Discord : https://discord.gg/yUsTKE4wQ9
Former chemistry student. 42born2code alumni. Reversing and pwning stuffs at RandoriSec.
Former RE team lead
@synacktiv - Former @AirbusSecLab lead
Collector of Quote
CTF w/ organizers and polygl0ts | ECSC swiss team & ICC team EU 24 | CS student @ EPFL
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (❤️program/code analysis)🐞🔍 @adhsec on hellsite, they/them, enby, #AuDHD
Pentester | Security enthusiast | CTF player | OSINT
Security expert @Synacktiv
<3 Python. Break stuff for fun !
Android Security Researcher @ Cellebrite
Security Researcher with @GHSecurityLab. CTF #int3pids. Opinions here are mine!
Programmation compétitive, cybersécurité & IA.
Co-fondateur & CTO @agoratlas.com, agence d'analyse des réseaux sociaux à grande échelle.
Reverse engineer @synacktiv.com. I appreciate Android related stuff
TrendAI Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Security Researcher - #OSCP #OSWE - Former @ENSIBS,
CTF Player, @AperiKube member,
Author of http://aperisolve.com
android/linux kernel @ Vigilant Labs | ctfs (pwn) w/ CoR + ELT
French pentester, but currently traveling around the world.
Passionate about hacking, I also enjoy building things with Rust.
VR team tech lead @synacktiv.com
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.