
Alan Sguigna
@alansguigna
Chief Product Officer, ASSET InterTech
ID: 100799262
https://www.asset-intertech.com/resources/blog/ 31-12-2009 16:32:24
580 Tweet
1,1K Takipçi
89 Takip Edilen

Alex Ionescu
@aionescu
Chief Technical Innovation Officer @crowdstrike. Windows Internals author and trainer. He/Him. RTs are not endorsements, opinions are my own.
David Weston (DWIZZZLE)
@dwizzzlemsft
Corporate Vice President, OS Security and Enterprise @Microsoft
Alex Matrosov
@matrosov
🔬Founder & CEO @Binarly_io, #codeXplorer, #efiXplorer, @REhints and "Rootkits and Bootkits" book. Previously worked at Nvidia, Cylance, Intel, ESET, Yandex.
Curt Wilson, human
@curtw
Exploring systems security since 1985. Malware+{cybercrime/espionage} analysis, threat intelligence + full-spectrum tech security research. Personal account.
Pavel Yosifovich
@zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses! 🚀 #WindowsInternals #TrainSecmikebriggs1973
@mikebriggs1973

Tim Misiak
@timmisiak
OS/systems engineer. Worked on WinDbg for a while. I write about low level tech sometimes. On bluesky: @timdbg.com On mastodon/fediverse: @[email protected]
Richard Johnson
@richinseattle
Computer Security, Reverse Engineering, and Fuzzing; Training & Publications @ fuzzing.io; hacking the planet since 1995; Undercurrents BOFH
Dreg
@therealdreg
Offensive hardware hacking & firmware dev, OS internals, C/C++, assembler, reversing, forensics, x86_64, AVR, ARM, PIC. Ex malware researcher
Matt Hand
@matterpreter
Director, Security Research @preluderesearch💜 | Author of Evading EDR nostarch.com/evading-edr 📖 | Adversary tradecraft & windows internals 🦠
Duong Nguyen
@duong6991
A software engineer at @Qualcomm
Duncan Ogilvie 🍍
@mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
Dmytro Oleksiuk 💥 [email protected]
@d_olex
zero-fucks-given infosec research | contacts: keybase.io/d_olex | 🇺🇦 Ukraine needs your help to kill Ruϟϟian zombies: savelife.in.ua/donate
Martin Bishop
@whenonkstreet
red team, cats... him/he/y'all.
Liuyang
@liuyangz_
心有猛虎,细嗅蔷薇
John Dunlap
@johndunlap2
Security Researcher, demoscene fan, hardcore Tetris enthusiast former GDS / former ToB / Leviathan Security / Trellix these days. Opinions are entirely my own.
[email protected]
@shanghai_lover

Andrea Allievi
@aall86
Currently Senior Windows Core OS Engineer, Windows Internals Enthusiast and Book author, tennis lover, currently working for MS. Opinions and tweets are my own.
Ivan Rouzanov
@ivanrouzanov
Debug Engineer. Windows, drivers and all things kernel mode. I express my views, not my employer's. My views are my own and just my personal opinions.
Satoshi Tanda
@standa_t
Software security engineer and trainer satoshi-tanda.bsky.social
x
@tubs
Coder.
Xeno Kovah
@xenokovah
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of OpenSecurityTraining2 ost2.fyi
Shane
@shane_soup
Solvitur ambulando
inconsistency
@ucgjhe
My tweets belong to a cranky guinea pig that lives in my imagination only. VR/RE
zoharbuber
@zoharbuber

@relativexd

Yarden Shafir
@yarden_shafir
A circus artist with a visual studio license
Connor McGarr
@33y0re
Software Engineer @preluderesearch
DebugPrivilege
@debugprivilege
Windows Nerd | Ex-MSFT | Former Microsoft MVP | Interested in Security, Debugging, and Troubleshooting.
Hex-Rays SA
@hexrayssa
We are a hi-tech company focusing on binary software analysis. Our main products are IDA Pro and the Hex-Rays Decompiler. Discourse: https://community.hex-rays
Xualvirs
@xualvirs3829

Amir M. Jahangirzad
@reodus_
Just another developer who is Interested in Vulnerability Research
Mehrshad Mollaafzal
@mehrshad_13_
Cyber Security Researcher
Linda Waelchi
@waelchi64711

x0reaxeax
@ks0reaxeax
degen level offsec and some cs2 not me - @x0reaxeax github.com/x0reaxeax steamcommunity.com/id/3c5745y
infradev
@infradev2
Interested in infrastructure development, cyber operations and security engineering
uyser
@user4285481

Malchemist
@m4lch3m1st
Whether red or blue evil things I brew #maldev #redteaming #reveng
Jonathan
@jon__reiter
Proud dad and husband, reverse engineer, exploit developer, author of SANS SEC670, Windows kernel developer, Air Force
Rami Hadji
@redactedoi

St4ckTr4c3
@_st4cktr4c3
Threat Hunter ☠️ | Malware Lover ☣️
somestuff nice
@stuff3578

Naman Devnani
@naman_devnani
Security Researcher | Purple Team | Bug Hunter | CTF Player | Science & Tech Enthusiast | R&D | All-Source Intelligence | CAP | DCSP | TTIA | BCDE | COL
destroy
@destroy2secure
Detect Eng & Threat Hunt / the Dark Side of
shrean
@shreansec
Trying to live
Zodd
@zodd_x
Interested in Security
noct
@never_unsealed
22 | INTJ-T | InfoSec Student | Firmware & OS-Level Security Research
ener1
@aaillesim
Security Nerd.
Stone Andy
@meta0918

arip petits
@arippetits

KiTchiNotchi
@kitchinotchi
ليس ولكم نزال فلكم ولي خسارة / لستم بي قتال ولا انا فيكم قصارة /انا السان اللهب المقاص عصارة/ نحو المساح هل قفارة / انا الصحراء لي بكم نضارة
Arlaweaguh
@arlaweaguh5347
Like to talk Do not hold any investment products
Ooceceak
@ooceceak281
Like to talk Do not hold any investment products
systm
@systm947673

adsasdad
@adsasdad229965

Jean
@jean089m

Tomer Eizenberg
@eizenbergt47800

memN0ps
@memn0ps
Rust software engineer & security researcher, into everything from low-level systems to high-level software development. @the_secret_club
舒滿州
@shumanzhou2

Feeliph3
@feelliph3

netherworld
@nullb0rn
Learner.
HuaLi
@huali43054468

Barand Sandinit
@barandsandinit
post-crisis underground terror
Emil Barel
@emilioonx

zhuoyunwei
@robinzyw31

maverick🇵🇸
@mavric1337
Our sweetest songs are those that tell of saddest thoughts