
ReWolf
@rwfpl
ǝ̝̰̰̣̪̻͍͞s̀ɹ͙͇͕̻̘ǝ͖̗͚ʌ̳͖͘ͅǝ̯̰͎̯͎̺ᴚ̣̙ ̜̦̝͉̖͟e͍͎͚̺n̸͉͙̭̩ͅg̝͖̫i͈̗̱̖̰n̪̕e̬̼͢ȩr͚̯̤͈̞͇̰
ID: 3310658177
http://blog.rewolf.pl 06-06-2015 14:30:45
781 Tweet
2,2K Followers
567 Following

Costin Raiu
@craiu
Cybersecurity researcher focused on threat intel & APTs. Breaking down attacks, hunting threats, and crafting YARA rules. 🛡️💻 #ThreatIntel #CTI #Crypto #YARA
Alex Ionescu
@aionescu
Chief Technical Innovation Officer @crowdstrike. Windows Internals author and trainer. He/Him. RTs are not endorsements, opinions are my own.
Claudio Criscione
@paradoxengine
Security Robot Overlord @ Google. Vulnerability Management @paradoxengine.criscio.net @[email protected]
David Weston (DWIZZZLE)
@dwizzzlemsft
Corporate Vice President, OS Security and Enterprise @Microsoft
Sean Heelan
@seanhn
Building software for understanding software.
mdowd
@mdowd
Internet Hacker. Founder of @vigilant_labs. Previously, co-founder of Azimuth Security (now L3Harris Trenchant)
Pavel Yosifovich
@zodiacon
Windows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses! 🚀 #WindowsInternals #TrainSec
Pete Markowsky
@petemarkowsky
Cofounder & CEO @northpolesec Prev: @google working on Security Agents including Santa. Cofounder and Chief Architect @capsule8 (tweets are my own.)
Alex
@alexanderjaeger
DFIR / CERT @Google - nice person - All opinions are mine... . Doing @TimesketchProj stuff. (🏊♂️) 🚲 🏃♂️ infosec.exchange/@jaegeral Time matters
Ange
@angealbertini
Reverse engineer, file formats expert. Corkami, CPS2Shock, PoC||GTFO, Sha1tered, Magika... Security engineer @ Google. He/him.
Tim Misiak
@timmisiak
OS/systems engineer. Worked on WinDbg for a while. I write about low level tech sometimes. On bluesky: @timdbg.com On mastodon/fediverse: @[email protected]
Andrej Karpathy
@karpathy
Building @EurekaLabsAI. Previously Director of AI @ Tesla, founding team @ OpenAI, CS231n/PhD @ Stanford. I like to train large deep neural nets 🧠🤖💥
Alex Stamos
@alexstamos
You can find me at: threads.net/@alex.stamos cybervillains.com/@alex
lcamtuf
@lcamtuf
Substack: lcamtuf.substack.com/archive Homepage: lcamtuf.coredump.cx
tomchop
@tomchop_
DFIR @Google by day; threat intel and malware analysis by night · BlueTeam (views are my own) · he/him · @[email protected] / @tomchop.bsky.social
ESET Research
@esetresearch
Security research and breaking news straight from ESET Research Labs.
DriverEntry
@driverentry
DriverEntry is a training school for low-level software developers for Windows. Here we'll share what we're up to, new courses, tips and more. Enjoy!
Maurice Heumann
@momo5502
🐍 Developer & Reverse Engineer. My girlfriend rates me 4/5 stars
🅰🅳🅼
@securityfreax
"Any sufficiently advanced incompetence is indistinguishable from malice" - Grey's Law Cyberchef @ CSIRT
Maciej Piechota
@haqpl
I’m a security enthusiast and technology polyglot, pug lover and drum’n’bass head. Vice Cpt @justCatTheFish, Daily Pwning @ElectrovoltSec @cure53berlin
Richard Johnson
@richinseattle
Computer Security, Reverse Engineering, and Fuzzing; Training & Publications @ fuzzing.io; hacking the planet since 1995; Undercurrents BOFH
Rohit Mothe
@rohitwas
Security Re..(dare i say it?) , struggling janitor. tweets,replies,retweets,likes,DMs entirely my own doing, undoing
Trend Zero Day Initiative
@thezdi
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Pasquale Stirparo 🌻🇺🇦
@pstirparo
#ThreatIntel #ICS #DFIR; ''Learning iOS Forensics'' author; machofile dev; #BSidesZH #PIVOTcon24 organizer; pers.: @pstirparo_pers; pstirparo.bsky.social
Florent Revest
@xenon132
Yet another software engineer bragging on the Internet.
petikvx
@petikvx
Malware Researcher Collecter - All my samples will be on app.any.run
Benoît
@benoitsevens

HyperDbg
@hyperdbg
We like hypnotizing computers. #HyperDbg github.com/HyperDbg • infosec.exchange/@hyperdbg • bsky.app/profile/hyperd…
Grzegorz Tworek
@0gtweet
My own research, unless stated otherwise. Not necessarily "safe when taken as directed". GIT d- s+: a+ C++++ !U !L !M w++++$ b++++ G-
b33f | 🇺🇦✊
@fuzzysec
意志 / Antiquarian @ IBM Adversary Services / Ex-TORE ⚔️🦅 / I rewrite pointers and read memory / AI Psychoanalyst / Teaching @CalypsoLabs
Sinaei
@intel80x86
Windows Internals enthusiast, Interested in hardware design & low-level programming. An active developer of @HyperDbg debugger. github.com/SinaKarvandi
mandatory.bsky.social
@iammandatory
Red Teamer, meme archivist, XSS Hunter author, DNS/TLD/web security researcher.
nt!PopGetDope
@ntpopgetdope
vulnerability researcher: basebands, fault injection, semiconductors, cats. theres a SEM in my living room... '02 Toyota MR-S (2ZZ-GE) '90 Honda VFR400R NC30
Satoshi Tanda
@standa_t
Software security engineer and trainer satoshi-tanda.bsky.social
farmpoet
@f4rmpoet
Cyberspace cowboy Infosec research
hasherezade
@hasherezade
Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
Adam Sindelar
@t80sr
OS development at Oculus, previously Linux security at Google. Astronomy in spare time. Views are my own.
Paolo Stagno (VoidSec)
@void_sec
Director of Research @Crowdfense. Windows Vulnerability Researcher and Exploit Developer, ex-@XI_Research
Ivan Kwiatkowski
@justicerage
Security @Meta. Maintainer of Manalyze, Gepetto, and writer. Trolling on a purely personal capacity.
Ardun Zachary Butler
@azakbutler

Tim Blazytko
@mr_phrazer
Binary Security Researcher, Chief Scientist at emproof.com and Trainer. Also at bsky.app/profile/mrphra…
vx-underground
@vxunderground
The largest collection of malware source code, samples, and papers on the internet. Password: infected
Yarden Shafir
@yarden_shafir
A circus artist with a visual studio license
cts🌸
@gf_256
Co-founder and hacker @zellic_io & @pb_ctf | youtube.co/basteg0d69 | 24 Intern @egirl_capital slow to reply to DMs
x86matthew
@x86matthew
C / asm / system emulation / reverse engineering. @the_secret_club
Saar Amar
@amarsaar
Reversing, exploits, {Windows, Hyper-V, *OS} internals, mitigations. Apple SEAR. Opinions are my own. @[email protected]
MrBruh
@mister_bruz

Felix Rieder
@fxrdr7

Iosif George-Andrei
@iosifache
ecurity Engineer @ Snap Inc. | Technical Advisor | Occasional Speaker | Open Source Contributor
🤷♂️
@floesen_

jvoisin
@dustriorg
This account is inactive, use the following instead: - bsky.app/profile/jvoisi… - infosec.exchange/@jvoisin - dustri.org/b/atom.xml
Marek Benny Strihavka
@strihavkamarek
Cyber-security & low-level programming
Off-By-One Conference
@offbyoneconf
A premier gathering of offensive cybersecurity professionals, researchers, thought leaders and innovators from around the region.
Thibaut
@passil_t
Cyber Threat Hunter at Broadcom Inc. (Symantec Enterprise Division) Formerly ESET Research. also me: infosec.exchange/@passil_t
____do_brendan_common((int *)&q, READ_ONCE(NULL))
@bjackmansw
this account is for _work related_ shitposts (he)
Matej Kašťák
@kastakmatej
Software engineer @Avast working on #YARA stuff.
Qiling Framework
@qiling_io
Follow and star us at github.com/qilingframewor…
Mr. Rc
@rcx86
Low Level Engineer | 17 y/o | Building @ZathuraDbg ◦ rcx86.me | 🇮🇳
Vlad Stolyarov
@vladhiewsha
Security Engineer @Google | A byte consists of 8 bits!
Hex-Rays SA
@hexrayssa
We are a hi-tech company focusing on binary software analysis. Our main products are IDA Pro and the Hex-Rays Decompiler. Discourse: https://community.hex-rays
nerv
@nervascii
#ascii artist of the 777 seas @razor 1911 Need anything ? Find me on EFnet, pm, mail : [email protected]
Zhengyi
@zhengyeee
instagram.com/zhengyeeecomics
What a week, huh? all Wednesdays
@whataweekhuh
Captain, it's wednesday. The amazing art for the profile picture was made by Blouk @bloukBlouk
Hors
@horsicq
Binary researcher. Assembler/C++. Author of many RE tools: github.com/horsicq
VollRagm
@vollragm
20 • Moderator @UnknownCheats • Interested in game-hacking and low-level development