Teenage security researcher & systems developer.
Discovered CVE-2025-43361, author of rustc_codegen_jvm, working on Apple M3 Linux drivers.
https://github.com/IntegralPilot 🇦🇺
twitter : @epsilon_sec
web site : epsilon-sec.com
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
www.interruptlabs.co.uk
We secure software with deep-dive audits, cutting-edge research, and in-depth trainings.
Placeholder. Probably read-only
https://github.com/blacktop
Organizer of HeroCTF || ctf w/ FlatNetworkOrg || TeamFR 2021 & 2022 🇫🇷 || 🥷 Synacktiv
The new foundation for documents: Limitless power to write, create, and automate anything that you can fit on a page.
Compte officiel de l'Agence nationale de la sécurité des systèmes d'information (ANSSI) | Retrouvez les alertes de #cybersécurité sur le compte @cert-fr.bsky.social
IT & Hacking https://xark.es/
zigzagging my way through cursed code and bugs
[bridged from https://infosec.exchange/@swapgs on the fediverse by https://fed.brid.gy/ ]
🇪🇪🏳️⚧️ | Archivist | 10 CVEs in Chrome | CSS sophomore | MapartCraft | Horse | rebane2001#3716 | Lyra 🦊
she/her
https://lyra.horse/
@rebane2001@infosec.exchange
Recon is the premier Reverse Engineering and Security conference held annually in Montreal. https://recon.cx
researcher @google; serial complexity unpacker
ex @ msft & aerospace
and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
https://tracesofhumanity.org
Previously: Golem Foundation/Wildland, Qubes OS, hardware/virtualization/OS security research.
When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl.
🌉 bridged from ⁂ https://infosec.exchange/@raptor, follow @ap.brid.gy to interact
Security @Google, Personal Account.
https://linktr.ee/TheLaluka
Sharing is Caring, Hacker, Eternel Learner, Cat! =^~^=
TrendAI Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
"I'm interested in all kinds of astronomy."
https://scrapco.de
Mostly cross-posting from Fediverse: @buherator@infosec.place
javascript:/*--></title></style></textarea></script></xmp><svg/onload='-/"/-/onmouseover=1/-/[*/[]/-alert(1)//'>
https://garethheyes.co.uk/#latestBook
Offensive security conference in the heart of Paris. 10-11th October 2025
https://www.hexacon.fr/
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker.
Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
Security expert @Synacktiv
Reverse engineer @synacktiv.com. I appreciate Android related stuff
CTF w/ organizers and polygl0ts | ECSC swiss team & ICC team EU 24 | CS student @ EPFL
VR team tech lead @synacktiv.com
Security enthusiast: RE, VR, exploits and stuff
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
mobile security / symbolic execution . he / him
android/linux kernel @ Vigilant Labs | ctfs (pwn) w/ CoR + ELT
#CTF 100% beurre salé.
Ouvert à tous, mais les places sont très prisées !
#BreizhCTF2025
Discord ➡️ http://discord.gg/ckaT65Qsfg
Reverse @ Synacktiv | CTF w/ TFNS
ɿɘɘniϱnɘ ɘƨɿɘvɘɿ
🎦 youtube.com/@jiskac
📝 naehrdine.blogspot.com
🐥 twitter.com/naehrdine
🎓 hpi.de/classen
📱 reversing.training
| CyberSecurity | Reverse Engineering | C and Rust | Exploit | Linux kernel | PhD | Only My Opinions :) |
Ninja reverser at @Synacktiv.com
Securing every bit of your data
https://quarkslab.com
About me?
| Website: https://mizu.re
| Tool: https://github.com/kevin-mizu/domloggerpp
| Teams: @rhackgondins, @FlatNetworkOrg, @ECSC_TeamFrance
| From: https://twitter.com/kevin_mizu
VR @ Synacktiv, low level security enthusiast
https://voydstack.re/
#RE #Pwn #FPV ~ Learning is endless ~ 🇫🇷 ~ @Synacktiv.com
Linux Evangelist, Malwares , Security Enthusiast, Investor, Contrarian , Neurology , Philanthropist , Reformist ,Sigma female
reverse engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time
Fedi: @retr0id@retr0.id
Macroblog: https://www.da.vidbuchanan.co.uk/blog/
Security Engineer @ Cloudflare,
ex-Google ISE,
I use bad software and bad machines for the wrong things.
My writing: https://carstein.github.io
【DΞCOMPILΞ NΣVΞR】
Android Red Team @google
Fuzzing @aflplusplus.bsky.social
CTF @enoflag
(opinions my own)
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
hacker, poster, weird machine mechanic
https://chompie.rip
macOS Security -- Trail running 🏃 -- Mountains ⛰ -- Tolkien fan
Usual mood: confused. Ingénierie à rebours & endless home renovation. I always enjoy a good walk down the page tables. He/him.
Mastodon: @laomaiweng@infosec.exchange
Twitter/X: @laomaiweng
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
We want to make fuzzing better and better
Follow for updates on AFL++ & LibAFL
Security researcher building reverse engineering tools @ CentraleSupélec
official Bluesky account (check username👆)
Bugs, feature requests, feedback: support@bsky.app