
Rich Warren
@buffaloverflow
Webshell Engineer. Red Team & Offensive Security Research @AmberWolfSec // @buffaloverflow.rw.md on bsky
ID: 293922100
06-05-2011 06:38:35
1,1K Tweet
10,10K Followers
661 Following

Sam Altman
@sama
AI is cool i guess
Justin Elze
@hackinglz
CTO @TrustedSec | Former Optiv/SecureWorks/Accuvant Labs/Redspin | Race cars
haroon meer
@haroonmeer
Security Geek at Thinkst. We build canary.tools
Wietze
@wietze
Threat Detection & Response. Views are my own, unless retweeted. Maintainer of ArgFuscator.net & HijackLibs.net Co-maintainer of lolbas-project.github.io
Infinity Ward
@infinityward
Game studio and developers of the original Call of Duty. #MW2 | #Warzone
Adam Chester 🏴☠️
@_xpn_
Hacker for Hire at @SpecterOps | Research at blog.xpnsec.com
Dominic Chell 👻
@domchell
Just your friendly neighbourhood red teamer @MDSecLabs | Creator of /r/redteamsec | mdsec.co.uk | nighthawkc2.io
Cedric Van Bockhaven
@c3c

mRr3b00t
@uk_daniel_card
Global Cyber Security Support
Iain Smart
@smarticu5
Hacker, coffee drinker, film watcher. Former secretary of @AbertayHackers, now I break into containers and pipelines for @controlplaneio
Maurice Heumann
@momo5502
🐍 Developer & Reverse Engineer. My girlfriend rates me 4/5 stars
marcoverip.bsky.social 🌻
@marcoverip
Enjoying blue skies better | Does a thing or two with red teaming @OutflankNL | part time race and drift car instructor
Garrett
@unsigned_sh0rt
Research at @SpecterOps
symeon
@symeonp
vuln research
Petr Beneš
@petrbenes
upper-mid-low-level. DMs open.
Trend Zero Day Initiative
@thezdi
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Gabriel Landau
@gabriellandau
Principal WinDbg’er @ Elastic. Thoughts are my own. Blogs tiny.cc/jqeavz @[email protected] @gabriellandau.bsky.social
Chris Spehn
@conscioushacker
Adversary Simulation @ IBM's X-Force Red.
Max Grim
@max__grim
Red Teamer @OutflankNL | Cyber Security | Messing around with hardware
Shawn
@anthemtotheego
Adversary Simulation @ X-Force Red | Head of Capability R&D | Implant Dev | Work In Progress | Thoughts My Own | github.com/anthemtotheego
Caitlin Condon
@catc0n
Adventurer. Takes a lot of photos, calls many places home. Vulnerability research director at @Rapid7. Opinions mine, etc. She/her.
SANS Offensive Operations
@sansoffensive
More Offensive Than Ever #PenTest | #PurpleTeam | #RedTeam | #ExploitDev Training, Certification, and Research
Cas van Cooten
@chvancooten
Benevolently malicious offensive security enthusiast || OffSec Developer & Malware Linguist || NimPlant & NimPackt author || @ABNAMRO Red Team
Tijme Gommers
@tijme
Offensive Security at @ABNAMRO 🐙. Forensics at @HuntedNL. Cyber Cyber Cyber ⚡. Bluesky: bsky.app/profile/tijme.…
Darren McDonald
@r3n5k1
Currently into Rust, phishing, redteaming, and hardware.
Grzegorz Tworek
@0gtweet
My own research, unless stated otherwise. Not necessarily "safe when taken as directed". GIT d- s+: a+ C++++ !U !L !M w++++$ b++++ G-
b33f | 🇺🇦✊
@fuzzysec
意志 / Antiquarian @ IBM Adversary Services / Ex-TORE ⚔️🦅 / I rewrite pointers and read memory / AI Psychoanalyst / Teaching @CalypsoLabs
Will Dormann is on Mastodon
@wdormann
I play with vulnerabilities and exploits. I used to be here on Twitter but now I'm here: @[email protected] infosec.exchange/@wdormann
Andy Iszatt
@iszatt

Rob Maslen
@rbmaslen
Computers and stuff
Florian Roth ⚡️
@cyb3rops
Head of Research @nextronsystems #DFIR #YARA #Sigma | detection engineer | creator of @thor_scanner, Aurora, Sigma, LOKI, YARA-Forge | always busy ⌚️🐇 | vi/vim
hasherezade
@hasherezade
Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
ATTL4S
@danilj94
I like spending time understanding things | FSAS @NCCGroupInfosec
Stephen Sims
@steph3nsims
Perpetual Student | SANS Fellow | Musician | Braggart Hater | Gray Hat Hacking | VR | 🏂 | deadcode | youtube.com/@OffByOneSecur…
Greg Linares (Laughing Mantis)
@laughing_mantis
20+ yrs in Infosec. Malware Influencer. I turn Malware into Art and Music. Art @MalwareArt. 4x Pwnie Nominee. 𝕍𝕏. GameDev. Autistic.
Maddie Stone
@maddiestone
Security Researcher. Previously Google Project Zero and TAG | 0days all day. Love all things bytes, assembly, and glitter. she/her.
Vincent Yiu
@vysecurity
Director, Red Team, Offensive Security. Help organizations safeguard their businesses from the bad guys.
John Hammond
@_johnhammond
Cybersecurity Researcher @HuntressLabs || Just Hacking Training @JustHackingHQ w/ @ethicalhacker || jh.live/training || jh.live/newsletter
zhiniang peng
@edwardzpeng
Cyber Security & Cryptograhpy
chompie
@chompie1337
hacker, weird machine mechanic, exploit dev @xforce
5pider
@c5pider
just a developer
Rad
@rad9800
counter adversary, protecting shareholder value by minimizing the loss expectancy of cyber incidents. building deceptiq - the deception engineering platform
mgeeky | Mariusz Banach
@mariuszbit
🔴 Red Team operator, ex-MWR/F-Secure, ex-AV engine developer @ESET, ex-Malware analyst 🦋 @mgeeky.bsky.social 🫖 green tea lover
x86matthew
@x86matthew
C / asm / system emulation / reverse engineering. @the_secret_club
DirectoryRanger
@directoryranger
This account assembles and disseminates information related to Active Directory and Windows security.
Dirk-jan
@_dirkjan
Hacker at @OutsiderSec. Researches AD and Azure (AD) security. Likes to play around with Python and write tools that make work easier.
Yarden Shafir
@yarden_shafir
A circus artist with a visual studio license
bohops
@bohops
Red/Purple/Research | Adversary Services @xforce red
Ryan Emmons
@the_emmons
Security Researcher, P2O ‘24. This profile is my own, and my tweets don't represent my employer :) infosec.exchange/@fuzz
Matt Burch
@emptynebuli
Security researcher with an interest in breaking the world of IoT to win fast cash at the ATM 😉
Connor McGarr
@33y0re
Software Engineer @preluderesearch
dylan
@_batsec_
rt @mdseclabs
Jake Bolam
@xixasec
Senior Security Consultant
Duane Michael
@subat0mik
Adversary Simulation Operator, Researcher, Teacher, Leader @SpecterOps
zebleer
@zebleerpo1
I'm not using this Twitter account anymore. Don't trust it. My new Twitter = @zebleerguy & you can verify that on my website and Telegram
Cube0x0
@cube0x0
0xC2.io -founder 🇸🇪
AmberWolf
@amberwolfsec
Offensive Cyber, Risk Management & Governance, Vulnerability Research and Technical Due Diligence
watchTowr
@watchtowrcyber
If there’s a way to compromise an organization, the watchTowr Platform will find it.
Interrupt Labs
@interruptlabs
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
TheADHDadults
@theadhdadults
The ADHD Adults podcast For ADHDadultUK charity please visit @adhdadultuk
Asahi Linux (@[email protected])
@asahilinux
Account retired, please follow us on Mastodon: @[email protected] social.treehouse.systems/@AsahiLinux
Piotr Bazydło
@chudypb
Principal Vulnerability Researcher at watchTowr | Previously: Zero Day Initiative | @[email protected]
Y4er
@y4er_chabug
Happy!
cjm00n
@cjm00nw
Finding bug and myself
Zerodark
@zerodarkio
Gain visibility to threats via our platform to enable you to do build your own threat intel feeds
Hexacon
@hexacon_fr
Offensive security conference in the heart of Paris. 10-11th October 2025 Join our Discord server! discord.gg/S4tJ99aHYG
No Context Brits
@nocontextbrits
A mordant celebration of British mediocrity according to the Washington Post. Contains sarcasm, irony and context. Submissions and requests via DM.
Y4tacker
@y4tacker
👋 About: Security Research、WAF Attack and Defense、Code Review 🔭 CTFer: @R3kapig(Member)/@0x401 Team(The third captain) ⭐️ Github: github.com/Y4tacker
drivertom
@drivertomtt
学生/信息安全/CTFer Student/Infosec/CTFer/