
Kenji Endo
@kenjiendo15
hacknshare.com
ID: 1373612068771880960
21-03-2021 12:27:00
56 Tweet
91 Followers
165 Following

Gareth Heyes \u2028
@garethheyes
JavaScript for hackers: Learn to think like a hacker. amazon.com/JavaScript-hac…
The Tor Project
@torproject
🦋 bsky.app/profile/torpro… We're a nonprofit defending privacy & freedom online. Download Tor Browser: t.me/TorProject
Stephen Fewer
@stephenfewer
Principal Security Researcher @rapid7. Decompiler @relyze. Core @metasploit dev 2009 - 2013. MSRC Top 100 2015. Pwn2Own 2011, 2021, 2024.
Emeric Nasi
@emericnasi
CyberSecurity researcher and founder of BallisKit. I have a passion for all infosec subjects especially redteam and writing offensive tools!
Katie Knowles
@_sigil
Security Researcher @ Datadog. 🐶 Head in the (Azure) clouds. Sometimes blogging, always curious. Aim to be, rather than to seem.
Ryan Cobb
@cobbr_io
Red Teamer | Hobbyist Software Developer | Operator @SpecterOps Developer: Covenant, SharpSploit, PSAmsi
Cn33liz
@cneelis
Red teamer @ Outflank. Passionate about networking and cybersecurity | father of two superheroes.
MDSec
@mdseclabs
Consultancy and Training from a trusted supplier of offensive security. Red Team and Adversary Simulation by ActiveBreach team | mdsec.co.uk | nighthawkc2.io
GuidedHacking
@guidedhacking
Reverse Engineering & Game Hacking Courses @ guidedhacking.com
Viking
@vikingfr
vikingfr.bsky.social
sixtyvividtails
@sixtyvividtails
Currently working as an independent GUID merchant. Fully licensed. I acquire, produce, and sell high-quality GUIDs.
Yann Razafimahefa
@yrazafim

hasherezade
@hasherezade
Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
Yuki Chen
@guhe120
古河, Indepent security researcher, Bug bounty, ACG Otaku, Pwn2Own 15/16/17, PwnFest16,TianfuCup 18/19/20, 5 times MSRC MVR yearly Top 1. Got two pwnie awards.
Source Incite
@sourceincite
We are Incite Team. Providing high quality Vulnerability Research & Training Services.
namazso
@namazso
prompt engineer for c++ compilers
Alejandro Parodi
@secsignal
Co-founder @Hackmetrix, Security Researcher, Malware analyst & Passionate about new technologies. D̶o̶n̶’̶t̶ have the drive to become a big scary famous hacker.
Ray
@igc_ray
Les batards ils ont fumé Pop Simoke #KCorp Twitch - twitch.tv/igc_ray/ |
Thinkst Canary
@thinkstcanary
Most companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.
Alex Neff
@al3x_n3ff
Pentester | Maintainer of NetExec
Alice Climent-Pommeret
@alicecliment
Malware and EDR stuff @harfanglab 🤓 || PTC || Sister of @h313n_0f_t0r & @lauriewired || m4lwa.re
mr.d0x
@mrd0x
Security researcher | Co-founder maldevacademy.com | lots-project.com | malapi.io | filesec.io
Archie
@archie_1997
A teen with an aspiration for computers, likes to code in C / C++ every once in a while.
Rad
@rad9800
counter adversary, protecting shareholder value by minimizing the loss expectancy of cyber incidents. building deceptiq - the deception engineering platform
Invoke RE
@invokereversing
Malware analysis can be hard, but learning it shouldn't be.
Bobby Cooke
@0xboku
Adversary Services @ IBM X-Force Red
Shogun Lab
@shogun_lab
Shogun Lab conducts R&D to help organizations secure their systems and software. おもしろい です ね。(shogunlab on bsky.social)
alex short 🇺🇦
@alexsho71327477
windows low level developer. windows internals, #winapi, #debugging, research. #opentowork github.com/rbmm linkedin.com/in/alex-short-…
Active Directory Things
@adallthetime
Microsoft Certified Master (MCM): Active Directory. Previously AD field engineer at Microsoft. Notes from the field & the lab (@duff22b)
Lex (Claire)
@non_curat_lex
Offensive security on industrial systems 🐢
nocturne
@nocturne_0x29a
night and darkness
Connor McGarr
@33y0re
Software Engineer @preluderesearch
Jack Halon
@jack_halon
Red Team and Offensive R&D at @CrowdStrike | Powered by ☕🍻🍩
mgeeky | Mariusz Banach
@mariuszbit
🔴 Red Team operator, ex-MWR/F-Secure, ex-AV engine developer @ESET, ex-Malware analyst 🦋 @mgeeky.bsky.social 🫖 green tea lover
hypen
@hypen1117
Security Researcher at Kaspersky, GReAT | Formerly KrCERT/CC, S2W Inc.
SinSinology
@sinsinology
Pwn2Own 20{22,23,24,24.5,25}, i look for 0-Days but i find N-Days & i chase oranges 🍊
BallisKit
@balliskit
BallisKit provides tooling and services to professional Pentesters & Red Teams. We develop MacroPack, ShellcodePack, and DarwinOps. #redteam #infosec
Florette
@einzigwahreflo
My favourite season is the fall of patriarchy 🍁
Doug Bienstock
@doughsec
IR Leader @Mandiant. Hacking things and responding to things being hacked. Opinions my own
5pider
@c5pider
just a developer
tzar
@dsec_net
Red Teamer, this is the neglected home of my security ramblings. Sometimes there's useful stuff.
Lupin
@0xlupin
Roni Carta alias Lupin. Co-Founder of Lupin & Holmes. R&D. Red Teamer. Bug Hunter. Musician 🤘
0xRo
@0x_ror
Cybersecurity enthusiast
🕳
@sekurlsa_pw
🃏🌑
Haidar
@haider_kabibo
Wine tester at Kaspersky :)
Daniel
@0x64616e
To the monsters we're the monsters.
Prelude
@preludeorg
Prelude Detect quickly transforms your threat intelligence into validated protections.
Soumyani1
@reveng007
Content absorber | CRTP | @BlackHatEvents Asia, USA, SecTor, Europe 2024 Arsenal and @WWHackinFest 2024 Presenter
Jordan Borean
@boreanjordan

Tony Gore
@nullg0re
Security Researcher, US Marine Corps Veteran, Microsoft Most Valuable Researcher 2023 & 2024