reverse engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time
Fedi: @retr0id@retr0.id
Macroblog: https://www.da.vidbuchanan.co.uk/blog/
I developed Cydia for jailbroken iOS devices and am now (theoretically) in charge of technology for Orchid; I am also a local politician in California.
Kernel/hypervisor engineer @awscloud EC2. Hobby @checkra1n. On Mastodon @ http://mastodon.social/@never_released.
@Straiker. Ex-Microsoft. Ex-Meta RedTeam, Ex-Endgame, Ex Fireeye. malwareunicorn.org
@DistrictCon Founder. Harvard & Georgetown MPP/JD candidate. @CyberStatecraft / @BelferCenter fellow, ex-Google threat research. Dog mom. Opinions=my own 👩🏻💻
Human Rights Defender @osservatorionessuno.org.
Security Researcher @shielder.com.
Former KeepassXC maintainer.
Computer Repair With A Smile.
thezero.org
Independent vulnerability researcher
Vulnerability Researcher at Bishop Fox
I'm a big ol' nerd that likes computers and movies.
CISO at 10X Banking, F-Secure/MWR, Capita/Westpoint, Qt/KDE
Opinions are my own @richmoore@infosec.exchange @moore_rich
Cofounder & CEO @infosectcbr.bsky.social | Organiser @bsidescbr.bsky.social
Memory Corruption, iOS, Swift, LLVM, CTF, old man stuff
NYC
VR team tech lead @synacktiv.com
Doing what I can to keep activists, journalists, and researchers safe and productive — writing at https://micahflee.com — author of HACKS, LEAKS, AND REVELATIONS https://hacksandleaks.com — signal: micah.01
unsecurity engineer
exploiting, reversing, gaming, coffee
A new DC hacker conference: Bringing together builders, breakers, and fixers to do cool shit.
Jan. 24-25, 2026
districtcon.org
Cybersecurity Specialist, Public Speaker, Ex-Hacker.
https://marcushutchins.com
Opinions my own.
https://sarah.dev
Sr Director of Engineering @ Google: Core Web, Android, iOS Infrastructure
Formerly Vue Core •
Frontend Masters teacher •
O'Reilly Author •
https://www.engmanagement.dev/
https://github.com/sdras
I want you to win and be happy. Code, OSS, STEM, Beyoncé, T1D, open source artificial pancreases, Portland, 3D printing http://hanselminutes.com inclusive tech podcast! VP/Member of Technical Staff, Microsoft/GitHub 🌮
http://hanselman.com/about
We're a specialised supplier providing cyber security research, engineering services and training.
Breaking bad UTF-8 implementations since 1991. I secure cybers and run trails. If I’m posting, I’m hopefully not on a trail. Views own. He/him
Security Engineer @ Cloudflare,
ex-Google ISE,
I use bad software and bad machines for the wrong things.
My writing: https://carstein.github.io
https://re-verse.io/ reverse engineering conference
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
Aussie security / tech guy.
Google Threat Intelligence. Co-founder Threat Analysis Group (TAG). Tweets are my own not my employers.
https://github.com/blacktop
aka itszn (itszen)
0xffff000041414141
Security researcher creating pwnable puzzles
https://infosec.exchange/@nyanbox
https://x.com/itszn13
LLM Art: https://bsky.app/profile/alternet.site
Working on Project Zero, Big Sleep, and V8 Security. Personal account.
viperbjk@twitter.com, bkerler@github.com
TZ pwner, reverse engineer and cryptanalyst
Professional disassembly enthusiast
Full of sound and fury
Signifying nothing
Security researcher at the ZDI
Izobashi.info
android/linux kernel @ Vigilant Labs | ctfs (pwn) w/ CoR + ELT
pwning kernels & blogging on os internals 🌱
Trenchant. An L3Harris company.
CTO @ Breakpoint Research
He/Him
Born at 340ppm
they/she 🏳️⚧️ | iOS Researcher | Azumanga Daioh Enjoyer
Software developer and reverse engineer
https://ridge.dev
Program Analysis / Reverse Engineering
Chief Scientist @ BINARLY
Website: https://xv.ax
Someone who likes debuggers a bit too much
🇨🇦 • 🇰🇷 • 🇫🇷
Vulnerability researcher, Pwn2own winner and PhD in my past life. I mainly break Android things.
RE / VR & Intense Coffee Consumption. He/Him. Opinions are my own. Curr: iOS . Past: Hypervisors.
🇨🇦 iOS Vulnerability Researcher, views are my own.
Security engineer with an interest in vulnerability research, cryptography, and software engineering.
https://github.com/fysac
VR/Exploit Dev ||>|| Love internals ||>|| Research interests in decompilation, exploit mitigations and side channels 🔹⚔️
Security/Privacy Engineer @Meta, Ex @Lacework, @Deloitte, @SecForce_LTD. CTFer with LCBC, vulnerability researcher and exploit dev. Opinions are my own
gen-z reverse engineer & exploit-dev • "embrace the c(ake)make" • shitposter • windows internals crackhead that likes emudev, os internals and ctfs @organizers
researcher. exploit dev. pdx. hacking @ atredis
https://dronesec.net/
vuln researcher+exploit dev | bordeaux enjoyer | friend of all cats | him/he | https://blog.coffinsec.com
We are the National Cyber Security Centre – part of the UK’s intelligence & cyber agency GCHQ. We help to make the UK the safest place to live and work online.
Security Researcher at Google Project Zero. 0-days all day. Love all things reverse engineering. she/her
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (❤️program/code analysis)🐞🔍 @adhsec on hellsite, they/them, enby, #AuDHD
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
Cybersecurity & Threat Intelligence. Knowledge is power, France is bacon 🥓
0day Researcher @ ████████████ / Baker / 0wl
// I post random things on here
uh does anybody care about these bios
Security researcher with an interest in formal methods.
B̶u̶i̶l̶d̶i̶n̶g̶ breaking things @ Interrupt Labs |
Teaching @ Australian National University
https://adrian-herrera.com
CTO of Microsoft Azure, author of novels Rogue Code, Zero Day and Trojan Horse, Windows Internals, Sysinternals tools. Opinions are my own.
意志 / Antiquarian @ IBM Adversary Services / Ex-TORE ⚔️🦅 / I rewrite pointers and read memory / AI Psychoanalyst / Teaching
at labs.calypso.pub
Corporate Vice President, OS Security and Enterprise @Microsoft
| CyberSecurity | Reverse Engineering | C and Rust | Exploit | Linux kernel | PhD | Only My Opinions :) |
Director Operations, NCSC, GCHQ. 30+ years in Government Cyber Operations. Views entirely my own and do not necessarily reflect those of my organisation. 🏴 🇺🇦
A circus artist with a visual studio license
TrendAI Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Fuzzing; Vulnerability Research;
Deep Learning; Reverse Engineering
Training & Publications @ http://fuzzing.io
Hacking the planet since 1995
Undercurrents.io BOFH
I'll stop the world and melt with you
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker.
Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
Military-grade reverse engineer @ Google, working on Android malware
Got mistaken for a member of Project Zero once.
Everything here is my own opinion
he/him ✨🌈🦄
I teach cryptography at Johns Hopkins. https://blog.cryptographyengineering.com
Founder of Azeria Labs, Trainer, Author of Blue Fox: Arm Assembly Internals & Reverse Engineering
hacker, poster, weird machine mechanic
https://chompie.rip
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
www.interruptlabs.co.uk
official Bluesky account (check username👆)
Bugs, feature requests, feedback: support@bsky.app