Dhanesh Kizhakkinan
@dhanesh_k
Occasional reverse engineer/vulnerability researcher.
ID: 52681417
01-07-2009 09:42:13
502 Tweet
1,1K Followers
159 Following
hanno
@hanno
Journalist. Climate, Energy, IT Security. Me on Mastodon: mastodon.social/@hanno Newsletter about Climate/Energy/Industry at industrydecarbonization.com
πΈπππππ β οΈ
@mykill
Usual content pausedβPandemic dad/secular homeschooler, FLARE RE @ Google β, infosec DJ (@FoulMouthMike), COVID long-hauler, @iaqadvocates cofounder. He/him.
Willi Ballenthin
@williballenthin
[email protected]
David Weston (DWIZZZLE)
@dwizzzlemsft
Corporate Vice President, OS Security and Enterprise @Microsoft
Krishna Chaitanya T
@novogeek
AppSec ninja, Developer, Hacker, Chess addict. Principal Security Engineer Lead at Microsoft, leading a cool AppSec pentest team. Views here are strictly mine
Halvar Flake
@halvarflake
Choose disfavour where obedience does not bring honour. I do math. And was once asked by R. Morris Sr. : "For whom?" @[email protected]
Sean Heelan
@seanhn
Building software for understanding software.
Natalie Silvanovich
@natashenka
Tamagotchi Hacker. Google Project Zero. She/her.
Abdulrahman Alqabandi
@qab
Security researcher @MicrosoftEdge
m0n0sapiens
@m0n0sapiens
Perpetual cognitive dissonance.
blasty
@bl4sty
irresponsible disclosure aficionado
Matthias Kaiser
@matthias_kaiser
Java/Android Vulnerability Researcher. 0xACED. Ex-Apple. Now @matthiaskaiser.bsky.social
lcamtuf
@lcamtuf
Substack: lcamtuf.substack.com/archive Homepage: lcamtuf.coredump.cx
Swamy S Nagaraju
@swamysng
Leading Sec Eng in Azure Confidential Computing, former MSRC Eng
x0rz
@x0rz
Cybersecurity & Threat Intelligence. Knowledge is power, France is bacon π₯
Nick Carr
@itsreallynick
Tech Director / Threat Intelligence at Microsoft. Previously, Director of Incident Response & Intel Research at Mandiant. Former Chief Technical Analyst at CISA
Petr BeneΕ‘
@petrbenes
upper-mid-low-level. DMs open.
Ankit Anubhav
@ankit_anubhav
Voice of IoT Security & awareness. I make the world of IoT a safer place. Ex- McAfee / FireEye / NewSky
Trend Zero Day Initiative
@thezdi
Trend Zero Day Initiativeβ’ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Matt Miller
@epakskape
Killing bug classes and breaking exploits as part of @msftsecresponse. Adding more entropy to the Internet. hick.org/~mmiller
Axel Souchet
@0vercl0k
Β―\_(γ)_/Β―, blogging on doar-e.github.io and posting codes on github.com/0vercl0k.
clem1
@_clem1
tail -f internet | grep exploit
Orange Tsai π
@orange_8361
This is π
Suha Can
@dtchd
CISO. security geek && coder :)
ϻг_ϻΡ
@steventseeley
Artist disguised as a logician. Pwn2Own Winner.
Jacob Soo
@_jsoo_
Founder starlabs.sg
Ivan Fratric ππ
@ifsecure
Security researcher at Google Project Zero. Author: Jackalope, TinyInst, WinAFL, Domato. PhD. Tweets are my own. Backup @[email protected]
Jann Horn - [email protected]
@tehjh
occasional human borrow checker; works at Google Project Zero; personal account; mastodon: [email protected]
dileep jallepalli
@dileepjallepall
Research Scientist @Trellix | Former @FireEye Opinions are my own.
bluerust
@bluerust
Michael Sikorski
@mikesiko
Dad. Reverse Engineer. Triathlete.
Chaitanya
@ant4g0nist
Founder @yokai_network || Vulnerability Research || fuzzing artist || π¦ + security
nedwill
@nedwilliamson
Fuzzing the Tesla Dojo Compiler, PPP for life SockPuppet, Soundhax, Speedcubing infosec.exchange/@nedwill
Joseph Bialek @[email protected]
@josephbialek
No longer using Twitter, find me on Mastodon: @[email protected] Security engineer @ Microsoft. I speak on my own behalf, not my employers.
Sinaei
@intel80x86
Windows Internals enthusiast, Interested in hardware design & low-level programming. An active developer of @HyperDbg debugger. github.com/SinaKarvandi
HackSys Team
@hacksysteam
Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning
zenhumany
@zenhumany
browser security researcher;virtualization security researcher
b0ring
@dnpushme
Learning & Research
Samuel GroΓ
@5aelo
V8 Security technical lead. Previously Project Zero. Personal account. Also @[email protected] and saelo.bsky.social
NOPAndRoll
@nopandroll
Bad at games, okay at hacking Startup Founder lost in a cyber corn maze at @OutcomeSecurity
hasherezade
@hasherezade
Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
Oliver Lyak
@ly4k_
Yet another security researcher π¦ Github: github.com/ly4k
Dillon Franke
@dillon_franke
Fuzzing, MacOS, vuln research @Google. Jesus Follower
Jonas L
@jonaslyk
@the_secret_club
Sreelakshmi Panangatt
@srlkhmi
TinySec
@tinysecex
Security Researcher. Usenix 2017 ,MSRC top 100 2016/2017/2018. All the tweets are totally my personal opinions, not about any of my current employer stuff.
idatips
@idatips
Tips and tricks for everyone's favorite disassembler. Account not run by Hex-Rays.
chompie
@chompie1337
hacker, weird machine mechanic, exploit dev @xforce
Theori
@theori_io
Empowering Innovation with Security.
Saar Amar
@amarsaar
Reversing, exploits, {Windows, Hyper-V, *OS} internals, mitigations. Apple SEAR. Opinions are my own. @[email protected]
Niklas B
@_niklasb
research @dfsec_com - @[email protected]
YCY
@batrix20
πΉπΌ Malware Research Freelancer / Threat Intelligence Analyst / Security Engineer * My thoughts are my own *
RET2 Systems
@ret2systems
We strive to reimagine vulnerability research, program analysis, and security education as it exists today. An @RPISEC corporation.
Rh0
@rh0_gz
Security Research β’ Program Analysis β’ Bugs and Exploits
Dennis Elser
@h3artcontainer
entomologist by h3art
POC_Crew π¨βπ©βπ¦βπ¦
@poc_crew
Organizer of Zer0Con, POC and MOSEC #Zer0Con2025 (zer0con.org)
Ian Beer
@i41nbeer
LΓͺ Hα»―u Quang Linh π»π³
@linhlhq
Security researcher