scud
@5cl_ld
ID: 706873327
20-07-2012 10:07:28
12 Tweet
27 Takipçi
301 Takip Edilen
Pavel Yosifovich
@zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses! 🚀 #WindowsInternals #TrainSec
Ange
@angealbertini
Reverse engineer, file formats expert. Corkami, CPS2Shock, PoC||GTFO, Sha1tered, Magika... Security engineer @ Google. He/him.
herrcore
@herrcore
UnpacMe | OALABS
Seongsu Park
@unpacker
Zscaler APT Research | Formerly Kaspersky GREAT | Threat Intelligence Hustler | Tweets are my own | Keybase: @seongsupark | Mastodon: @[email protected]
tlk
@tlk___
JB Cayrou
@jbcayrou
Jeremy Fetiveau
@__x86
CEO & co-founder @epsilon_sec
OpenSecurityTraining2
@opensectraining
501(c)3 Nonprofit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021! [email protected]Karion
@karion_
Bien 🇻🇳
@bienpnn
P (Million Live!) hackerman at @qriousec & @seasecresponse & @ProjectSEKAIctf Tiếng Việt / English / 日本語 范阮玉邊
GuidedHacking
@guidedhacking
Reverse Engineering & Game Hacking Courses @ guidedhacking.com
farmpoet
@f4rmpoet
Cyberspace cowboy Infosec research
Samuel Groß
@5aelo
V8 Security technical lead. Previously Project Zero. Personal account. Also @[email protected] and saelo.bsky.social
Patrick Wardle
@patrickwardle
🛠 🍎 👾 Objective-See'ing & DoubleYou'ing
HackerOne
@hacker0x01
The only official HackerOne Twitter account. A global leader in offensive security solutions. #HackForGood #togetherwehitharder
/r/netsec
@_r_netsec
Follow for new posts submitted to the netsec subreddit. Unofficial.
unSafe.sh Bot
@buaqbot
不安全文章更新机器人 telegramBot t.me/aqinfo unsafe.sh
Tim Blazytko
@mr_phrazer
Binary Security Researcher, Chief Scientist at emproof.com and Trainer. Also at bsky.app/profile/mrphra…
SinSinology
@sinsinology
Pwn2Own 20{22,23,24,24.5,25}, i look for 0-Days but i find N-Days & i chase oranges 🍊
starlabs
@starlabs_sg
A Singapore company that discovers vulnerabilities to help customers mitigate the risks of cyber attacks. Organisers of @offbyoneconf
spaceraccoon | Eugene Lim
@spaceraccoonsec
Here to learn! Infosec@Open Government Products | White Hat && SecOps
Connor McGarr
@33y0re
Software Engineer @preluderesearch
chompie
@chompie1337
hacker, weird machine mechanic, exploit dev @xforce
mhmd berro (badcracker)
@badcrack3r
22 Years old. Researcher at hackerone. Known as badcracker. Listed at more than 100 companies hacker's hall of fame.
Des
@des00464472
Cyber threat hunter. Don't be evil,just for fun.
0xor0ne
@0xor0ne
| CyberSecurity | Reverse Engineering | C and Rust | Exploit | Linux kernel | PhD | My Tweets, My Opinions :) |
seal
@seal9055
Vulnerability Researcher at @InterruptLabs
Interrupt Labs
@interruptlabs
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
Operation Zero
@opzero_en
The only Russian-based zero-day vulnerability purchase platform. Telegram: @opzero_en / @opzero_ru
TheZDIBugs
@thezdibugs
Checks for high severity, 0day, or Pwn2Own related advisories published by @thezdi
Simon
@sim0nsecurity
2025 MSRC Q1 | 2024 Q1/2/3/4/MVR | 2023 HackerOne H1-4420. Researcher @msftsecresponse,@Hacker0x01 and @intigriti,I like pwning,together we hit harder
PIVOTcon
@pivot_con
Threat Research Conference in Europe - Malaga, Spain - 7-9 May 2025. #StayTuned #ComingSoon #PIVOTcon #PIVOTcon25
exploits.club
@exploitsclub
A VR, RE, and Exploit Dev weekly newsletter | Join the club Contact: [email protected]
Phrack Zine
@phrack
Since 1985
DistrictCon
@districtcon
A new DC hacker conference: Bringing together builders, breakers, and fixers to do cool shit.
FatzQatz
@fatzqatz
As a hobbyist in malware analysis, I enjoy uncovering cyber threats for fun.
SecAI
@secai_ai
Innovative threat intelligence-driven and AI-powered company aiming at cyber threat detection and response. 🏢 secai.ai 🔎 i.secai.ai/research
RE//verse
@reverseconf
A conference for all things in the reverse engineering universe... re-verse.io
Unit 42
@unit42_intel
The latest research and news from Unit 42, the Palo Alto Networks (@paloaltontwks) Threat Intelligence and Security Consulting Team covering incident response.
reverseame
@reverseame
RME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: t.me/reverseame
2ero
@baoshengbincumt
#APT Hunter #CTI Middle East Case, please send email([email protected]) VB Speaker Twitter only represents my personal opinion 别乱截我X内容发公众号*3
Alex Plaskett
@alexjplaskett
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
Saar Amar
@amarsaar
Reversing, exploits, {Windows, Hyper-V, *OS} internals, mitigations. Apple SEAR. Opinions are my own. @[email protected]
SSD Secure Disclosure
@securiteam_ssd
SSD provides the support you need to turn your experience uncovering security vulnerabilities into a highly paid career. [email protected]
Johann Aydinbas
@jaydinbas
Reverse engineering, malware
offensivecon
@offensive_con
OffensiveCon is a highly technical international security conference focused on offensive security only. 12-17th of May. Organized by @Binary_Gecko.
RET2 Systems
@ret2systems
We strive to reimagine vulnerability research, program analysis, and security education as it exists today. An @RPISEC corporation.
Man Yue Mo
@mmolgtm
Security researcher at GitHub Security Lab. Tweets/views/opinions are my own.
POC_Crew 👨👩👦👦
@poc_crew
Organizer of Zer0Con, POC and MOSEC #Zer0Con2025 (zer0con.org)
Aidan Khoury
@aidankhoury