Astrophysicist turned advocate; guiding the globe to a safer, stronger Internet (ht APF). Distinguished Technologist @internetsociety.bsky.social https://josephhall.org/ (former CDT, NYU, Princeton CITP, Berkekey iSchool/Astro)
Senior Lecturer in Cyber Secutity at @UniMelb & ARC DECRA Fellow. Prev @MonashInfotech & @NUSComputing . (Fuzz) Testing enthusiast.
Security Researcher | Occasional Software Developer | afks for @dicegangctf
professional strings(1) operator
rust reverse engineering training -> @decoderloop.com
she/her or they/them
🏳️🌈😎
personal account! views are mine.
en_CA/zh_CN/fr_CA
https://cxiao.net
https://infosec.exchange/@cxiao
We make IDA, the leading tool for binary analysis, trusted by top cybersecurity teams for reverse engineering and malware defense.
Climate change social scientist. Collaborator, determined dreamer, dad. Director, @ClimateSSN.bsky.social And @climatedevlab.bsky.social
www.climatedevlab.brown.edu CSSN.org personal account; reskeets NE endorsement
https://github.com/blacktop
There’s no sense crying over every mistake. You just keep on trying ’til you run out of cake
- GLaDOS
https://welltypedwit.ch
Static analysis by day, baduk and old-time music by night. Writing compilers to stop the baddies.
Beyond testing tools, solutions that deliver expertise.
🌐 Chip & binary security testing
www.eshard.com
I talk about functional programming and compilers. Building a high performance Datalog called “eclair” with Haskell and LLVM.
Reverse Engineering | Network | Dev | Hacking
https://www.linkedin.com/in/fabdotnet
https://hackerone.com/fabdotnet
https://twitter.com/FabDotNET
Malware analyst and reverse engineer, author of the Binary Analysis Course. DMs are always open. Opinions are my own and not the views of my employer.
http://github.com/frankmcsherry/blog
i sometimes do things with rust and sometimes also do other things and sometimes i don't do anything at all
find me as Noratrieb everywhere I am
The Next 700 Programmers.
Reverse Engineer focused on decompilation, disassembly, and software internals.
Website: https://nicolo.dev/en/
Binary Security Researcher & Trainer
Website: https://synthesis.to
kmicinski.com
Interested in automated reasoning, static analysis, and logic programming and literally nothing else.
We secure software with deep-dive audits, cutting-edge research, and in-depth trainings.
CS professor at UT Austin, does research in programming languages & formal methods.
galois.com
For nearly 25 years, Galois has combined mathematical rigor with curious creativity to cut through complexity and guarantee trustworthiness in the world’s most critical systems.
Principal Security Engineer at Microsoft. Formerly at Google and Amazon.
Assistant Professor @ Eurecom. I'm interested in formal methods for low-level security. https://leslyann-daniel.fr
swedish cat computer math person
He/They • 🏳️🌈🏳️⚧️ pan
🐸 and 🐢 appreciator & 🍄 enthusiast
🧑💻 Platform Security Engineer
👾 REing dead games
✊ anti-capitalist & anti-imperialist • pro-unionization
Black Lives Matter, Trans Rights are Human Rights, I stand for a free Palestine 🇵🇸
Security Researcher and InfoSec PhD-er
Computer Science professor at Princeton. Loves all things programming languages and distributed systems. Including YOU! https://languagesforsyste.ms
Doing security research. For fun and profit...
Prof at IIT Madras, CTO of Tarides.com, Trustee at mmht.clinic
kcsrk.info
Senior Principal Security Researcher at @rapid7.com. Specializing in software vulnerabilities and exploitation. stephenfewer.github.io
and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
Hunting pokemons for a living @exatrack.bsky.social
Security research and breaking news straight from ESET Research Labs.
welivesecurity.com/research/
Professor at CentraleSupélec | Head of SUSHI Research Team (Inria/CentraleSupélec/CNRS/ENS Rennes) | IRISA Lab | Cybersecurity | Hardware/Software Security
Old-school Malware & Offensive Security Researcher | ⚡Kernel Pwner⚡ | Research IPv6 Blog: http://kr1m1nal.net
Reverse Engineering and Malware Analysis
unsecurity engineer
exploiting, reversing, gaming, coffee
Principal Exploit Dev - Breakpoint Research
We’re an international software company that helps people and organisations use #OCaml to build safer & faster code. #OCaml #FunctionalProgramming #MirageOS 🐫
@ESET Distinguished Researcher | alum of McAfee, Microsoft MVP, Tribal Voice, Zultys | Mod @Lenovo, @Neowin.Net, Scots Newsletter forums | Intel Insider Council | Repost ≠ endorse
i work at the intersection of set theory and figurative language
http://ianthehenry.com | http://bauble.studio | http://janet.guide | http://toodle.studio
Fighting for human rights across UK & the world 🌍 follow for activism & news. Amnesty UK (Charitable Trust & Section).
http://amnesty.org.uk/
We defend human rights around the world.
Let's get to work!
Mathematician interested in the study and teaching of computational logic, functional programming and interactive theorem proving.
Homepage: https://jaalonso.github.io
Sevilla, Spain
PyPy/RPython contributor. Half time teaching at Uni Düsseldorf. Works on dynamic language implementations. Love street art and art in public spaces, hiking, reading.
they/them
Computer Friend, Not a Bird
www.philipzucker.com
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
www.interruptlabs.co.uk
Softwares, maths, compilers and bears.
https://www.stephendiehl.com/
Researcher at CNRS. Feminist. I work on microarchitectural security.
https://cmaurice.fr
Computer security researcher at CMU's Software Engineering Institute; {computer,car lease} hacker; rescue dog daddy; soccer player/referee; skier.
https://edmcman.github.io/
Fond of reverse engineering and software development.
Doing security engineering at some company.
⛓️Binarly is the world’s most advanced automated software supply chain security platform.
I work on http://github.com/ciao-lang/ciao, a modern Prolog system.
You can also find me on http://mastodon.social/@jfmc
IMDEA Software Institute & UPM
Berlin. Does things with computers and phones.
Firmware in the Pacific Northwest.
My views here do not reflect those of my employer, either present, past or future.
https://mastodon.social/@yannickboog
https://x.com/intent/user?screen_name=YannickBoog
Reader in Privacy Law @AstonUniversity. Tech Law and Reg, Privacy and DP, Digital Death, AI Death, Ethics, Superheroes, BQ Marathoner (X @EdinaRl)
(he/him) Security Engineer/Researcher, PhD. AppSec, Fuzzing, Binary Analysis, Rust. Also 🤘🚴🥋👶
mobile security / symbolic execution . he / him
Co-leader OWASP Cornucopia. If you like what we do for open source, visit our code repository https://github.com/OWASP/cornucopia and give us a star ⭐
🌈 «Difference is of the essence of humanity» 🦄 – John Hume
#appsec #owasp #cornucopia #threatmodeling
hi, I'm amos! 🍃 they/them 🫐 open-source witch & maker of snappy videos and articles at @bearcove.eu ✨ be kind, be curious
articles: https://fasterthanli.me
videos: https://youtube.com/@fasterthanlime
podcast: https://sdr-podcast.com
pronouns: they/them
Faculty @CISPA Helmholtz Center doing software security, program analysis, and fuzzing
Previously at SEFCOM lab @ASU and @RUB
Computer Security PhD student@UCSB Seclab | Binary tamer | hacking@shellphish
Captures flags with Tasteless. Assistant Professor at UoB and maintainer of FirmWire & avatar2.
offensive security research, embedded systems, weird file formats and all things RTOS
Cat content || Joern || GTFO
https://quedev-security.com/
@joernio core
@allesctf
@0x4d5a@infosec.exchange
Tech Dysangelist
cDc/hack.xxx/Veilid
Support Veilid! Badge: 🅅 www.veilid.com
Merch at: @hack.xxx
he/him/"hey buddy"
Former chemistry student. 42born2code alumni. Reversing and pwning stuffs at RandoriSec.
CTO @ Breakpoint Research
He/Him
Born at 340ppm
Vulnerability Researcher | Exploit Developer (speaker 3x at DEF CON)
When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl.
🌉 bridged from ⁂ https://infosec.exchange/@raptor, follow @ap.brid.gy to interact
Fuzzing & stuff https://hexgolems.com
Security researcher building reverse engineering tools @ CentraleSupélec
Security Engineer @ Cloudflare,
ex-Google ISE,
I use bad software and bad machines for the wrong things.
My writing: https://carstein.github.io
Author of @radareorg, mainly active in the fediverse @pancake@infosec.exchange
Security researcher at the ZDI
Izobashi.info
vuln researcher+exploit dev | bordeaux enjoyer | friend of all cats | him/he | https://blog.coffinsec.com
Occasional OCaml programmer. Host of Signals and Threads http://signalsandthreads.com
0day Researcher @ ████████████ / Baker / 0wl
// I post random things on here