
WaterBucket
@dharanisanjaiy
Windows Explorer
ID: 1464574417154023427
https://dharani-sanjaiy.github.io 27-11-2021 12:38:54
693 Tweet
172 Takipçi
306 Takip Edilen

Chris Spehn
@conscioushacker
Adversary Simulation @ IBM's X-Force Red.
WithSecure Labs
@fsecurelabs
With great research comes great responsibility.
dreadnode
@dreadnode
Advancing the state of offensive security.
mj0011
@mj0011sec
CEO of Cyber-Kunlun & Kunlun Lab. Former CTO of Qihoo 360, Founder of team 360Vulcan.
ϻг_ϻε
@steventseeley
Artist disguised as a logician. Pwn2Own Winner.
Johann Rehberger
@wunderwuzzi23
Hacking neural networks so that we don’t get stuck in the matrix. Builder and Breaker. Opinions are my own.
Andrea Allievi
@aall86
Currently Senior Windows Core OS Engineer, Windows Internals Enthusiast and Book author, tennis lover, currently working for MS. Opinions and tweets are my own.
Azure
@4zure9
Love loli, Author of AlphaROMdiE.
Satoshi Tanda
@standa_t
Software security engineer and trainer satoshi-tanda.bsky.social
hypr (find me on bluesky)
@hyprdude
vuln researcher+exploit dev | pwn2own '24 winner | 0x4141414141 enthusiast | bordeaux enjoyer | friend of all cats | him/he
Atredis Partners
@atredis
Atredis is a 100% worker-owned team of world-class security researchers and consultants. We do risk-centric, research-driven security testing and consulting.
D4m0n
@d4m0n_8

flux
@0xfluxsec
Cyber professional (red team), security and systems programming | Rust | github.com/0xflux/ | fluxsec.red
Marina Simakov
@simakov_marina
Security Researcher @PreemptSecurity
mbg
@mbrg0
Breaking AI. Building @zenitysec, lead @owaspnocode, columnist @DarkReading
Haidar
@haider_kabibo
Wine tester at Kaspersky :)
meeko✨(CFXX E58-59)
@meekochii
reformed cybercriminal (rt/posts are my own) | pfp by @t0meku
Operation Zero
@opzero_en
The only Russian-based zero-day vulnerability purchase platform. Telegram: @opzero_en / @opzero_ru
wei
@xiaowei___
virtualization and webbrowser security researcher
immortalp0ny
@immortalp0ny
Passionate in puzzle solving All tweets are my own deadprogrammers.club
binaryboy
@b1n4r1b01
average IDA View-A enjoyer
Interrupt Labs
@interruptlabs
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
Almond OffSec
@almondoffsec
Offensive Security team at Almond - Follow us also on infosec.exchange/@AlmondOffsec
Yazidou
@xacone_
Another infosec noobie. New account. github.com/Xacone
TKYN
@tkynsec
The person of all time
Jael Koh
@_jaelkoh
Security Research @pixiepointsec
[email protected]
@peterpan980927
Mobile Security Researcher @starlabs_sg
TianfuCup
@tianfucup
Tianfu Cup PWN Contest Official Account
SinSinology
@sinsinology
Pwn2Own 20{22,23,24,24.5,25}, i look for 0-Days but i find N-Days & i chase oranges 🍊
j00sean
@j00sean
Finding bugs everywhere
es3n1n
@es3n1n
developer, reverse engineer, occasionally a ctf player admonymous.co/es3n1n
ö
@r0keb
low level enthusiast
chiefpie
@cplearns2h4ck
学无止境、谦卑而行 | VR @starlabs_sg
watchTowr
@watchtowrcyber
If there’s a way to compromise an organization, the watchTowr Platform will find it.
7eRoM
@7erom
Security Researcher
Archie
@archie_1997
A teen with an aspiration for computers, likes to code in C / C++ every once in a while.
Ver
@ver0759
Windows Security / 2024 MSRC MVR #11 / CTFer @天枢Dubhe / Tweets are my own.
Nathan Blondel
@slowerzs

Phrack Zine
@phrack
Since 1985
0Dr3f
@0dr3f
Vulnerability Research & Exploit Development 💻
drm
@lowercase_drm
@AlmondOffSec but mostly shilling for #pywerview
RedTeam Pentesting
@redteampt
Official RedTeam Pentesting GmbH account -- Impressum: redteam-pentesting.de/imprint/
EXPMON
@expmon_
Advanced sandbox-based system specifically designed and built for detecting file-based zero-day and hard-to-detect exploits. By @HaifeiLi.
h0mbre
@h0mbre_
# Exploit Reliability Engineer # Developing a full-system snapshot fuzzer: github.com/h0mbre/Lucid # Avi: instagram.com/chingyeh005
Two Seven One Three
@twosevenonet
Security Researcher at ZeroSalarium.com || Penetration Tester || Red Teamer || Social Engineering Awareness Trainer
Piotr Bazydło
@chudypb
Principal Vulnerability Researcher at watchTowr | Previously: Zero Day Initiative | @[email protected]
Michael Maltsev
@m417z
About me: m417z.com/about/ Software: ramensoftware.com Source code: github.com/m417z
RWXstoned
@rwxstoned
Red & Lonesome
Nero
@nero0oo0
| Security Consultant, Red Teamer and Researcher |
Ajay (blue tick)
@iamalch3mist
embedded security researcher | re,vr...