
Cedric Halbronn
@saidelike
Security researcher, Pwn2Own 2021, Pwn2Own 2022, #RE #exploitdev (Mastodon: @[email protected])
ID: 133652104
https://saidsecurity.wordpress.com/ 16-04-2010 09:08:25
6,6K Tweet
3,3K Followers
653 Following

Simon Willison
@simonw
Creator @datasetteproj, co-creator Django. PSF board. Hangs out with @natbat. He/Him. Mastodon: fedi.simonwillison.net/@simon Bsky: simonwillison.net
Chris Frohoff
@frohoff
building things, breaking things, building things that break things. ysoserial night janitor. journeyman ctf plumber. he/him infosec.exchange/@frohoff
Sean Heelan
@seanhn
Building software for understanding software.
mdowd
@mdowd
Internet Hacker. Founder of @vigilant_labs. Previously, co-founder of Azimuth Security (now L3Harris Trenchant)
AIfredo 0rtega
@ortegaalfredo
Software Developer - Security researcher - Cybergaucho - @[email protected] AI-related: neuroengine.ai discord.gg/raeft3whmn
blasty
@bl4sty
irresponsible disclosure aficionado
NK
@nikaiw

Matthias Kaiser
@matthias_kaiser
Java/Android Vulnerability Researcher. 0xACED. Ex-Apple. Now @matthiaskaiser.bsky.social
Sami Koivu
@samikoivu
I say clever things when no one's around. Work@Oracle. The views expressed on this twitter stream are my own and do not necessarily reflect the views of Oracle.
Rodrigo Branco
@bsdaemon
Just an opinionated security researcher. Opinions are my own H2HC (Hackers 2 Hackers Conference)
Richard Johnson
@richinseattle
Computer Security, Reverse Engineering, and Fuzzing; Training & Publications @ fuzzing.io; hacking the planet since 1995; Undercurrents BOFH
Trend Zero Day Initiative
@thezdi
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
n30m1nd
@n30m1nd
😬
Hans-Martin Münch
@h0ng10
CEO of MOGWAI LABS GmbH. I play CTF with powerpuffpwn.
Axel Souchet
@0vercl0k
¯\_(ツ)_/¯, blogging on doar-e.github.io and posting codes on github.com/0vercl0k.
Juan Branco ✊
@anatolium
Veritas odium parit. Avocat et docteur en droit. A l'ombre de la nuit brune, on arme les esprits. Previously at Yale, ICC, Max Planck, French Foreign Affairs.
Orange Tsai 🍊
@orange_8361
This is 🍊
Wouter Coekaerts
@woutercoekaerts
Programming puzzles and security enthousiast. ex-@Square . @[email protected]
James Chambers
@jamchamb_
security research and reverse engineering | security consultant | @[email protected]
Ivan Krstić
@radian
Head of Security Engineering+Architecture (SEAR) at Apple. I don’t speak for my employer.
ϻг_ϻε
@steventseeley
Artist disguised as a logician. Pwn2Own Winner.
Synacktiv
@synacktiv
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
PL 🤘🦇🤘
@phlaul
Infosec, creative coding and other geekism. he/him. (shit) posting my own and do not represent any one else ✨ 🦛:@[email protected] 🦋: phlaul.bsky.social
Samuel Groß
@5aelo
V8 Security technical lead. Previously Project Zero. Personal account. Also @[email protected] and saelo.bsky.social
Patrick Ventuzelo
@pat_ventuzelo
Founder & CEO of @FuzzingLabs | Security Researcher focused on Fuzzing & Vulnerability Research | Rust, Go, Wasm, Browser, Telecom, Blockchain & web3 Security
Hugow
@hugow_vincent
Security researcher && cat memes. Climb/fly sometimes 🪂
Xeno Kovah
@xenokovah
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of OpenSecurityTraining2 ost2.fyi
Neovim: vim out of the box
@neovim
Posts refer to Nvim prerelease/development build. Usage/configuration questions: github.com/neovim/neovim/…
Oliver Lyak
@ly4k_
Yet another security researcher 🔦 Github: github.com/ly4k
Michael Stepankin
@artsploit
Security Researcher at @GHSecurityLab
yongchuank
@yongchuank
Security researcher @pixiepointsec | @yongchuank.bsky.social
LiveOverflow 🔴
@liveoverflow
wannabe hacker... he/him 🌱 grow your hacking skills @hextreeio
Janggggg
@testanull
Kẻ soi mói, Re-searcher @dfsec_com
cts🌸
@gf_256
Co-founder and hacker @zellic_io & @pb_ctf | youtube.co/basteg0d69 | 24 Intern @egirl_capital slow to reply to DMs
offensivecon
@offensive_con
OffensiveCon is a highly technical international security conference focused on offensive security only. 12-17th of May. Organized by @Binary_Gecko.
x86matthew
@x86matthew
C / asm / system emulation / reverse engineering. @the_secret_club
starlabs
@starlabs_sg
A Singapore company that discovers vulnerabilities to help customers mitigate the risks of cyber attacks. Organisers of @offbyoneconf
kylebot
@ky1ebot
CTF player @Shellphish | PhD Student @ASU | @angrdothorse dev | Author of how2heap | Vulnerability Research Hobbyist | @[email protected]
Ollie Whitehouse
@ollieatnowhere
CTO @NCSC Former: PortSwigger, Interrupt Labs, NCC Group, BlackBerry, Symantec and Atstake
SinSinology
@sinsinology
Pwn2Own 20{22,23,24,24.5,25}, i look for 0-Days but i find N-Days & i chase oranges 🍊
Harsh Bothra
@harshbothra_
Freelance Pentester & Consultant • Cobalt Core Lead & Pentester • Author • Speaker • Blogger • SecurityExplained • Project Bheem • Learn365 • Views are personal
Epsilon
@epsilon_sec
Security research. Event planning. Very few clicks.
Phrack Zine
@phrack
Since 1985
Thomas Fox
@skipfournownext

Neuroengine
@neuroengineai
Access the latest AI models for free using API or web.
Satharus
@aelmayyah
HW&FW security researcher. GCFA, eCRE. Purple Teamer. Tinkerer. Into hardware, security, reverse engineering, videogames, rock, and cycling! Views are my own.
MOGWAI LABS GmbH
@mogwailabs
a infosec boutique with a strong emphasis on offensive security, based in Neu-Ulm (South Germany)
浅蓝
@b1u3r

pyn3rd
@pyn3rd
Security Researcher&Red Team&Cloud Security. BlackHat&HITB&CanSecWest Speaker.
Nathan
@nathansrf
Security Researcher, and InfoSec PhD Student at @RHULCyberCDT
toasterpwn
@toasterpwn
CTF @EmuExploit / @malta_ctf | pwn/rev/crypto | Security Researcher | toasterpwn.github.io
0xTen
@_0xten
android/linux kernel @vigilant_labs • prev blockchain @osec_io • ctf/pwn @cor_ctf + @eltctfbr
konata
@konatabrk
Vulnerability Researcher
Off By One Security
@offby1security
This is the X page for the Off By One Security YouTube channel and Discord server. Streams every Friday at 11AM PT. discord.gg/offbyonesecuri…
Xion
@0x10n
CMU CSD PhD student / 2024 Top#0 Chrome VRP Researcher / Winner of Pwn2Own Vancouver '24, TyphoonPWN '24, DEFCON 31 CTF, ... / PPP, KAIST GoN '18, @zer0pts
Ezrak1e
@ezrak1e
Security researcher of Ant Security Light-Year Lab
AmberWolf
@__amberwolf__

Pietro Oliva
@0xsysenter
Security researcher @ Oracle. Opinions are my own. mastodon.social/@0xsysenter@in…
patate
@patateqbool

Sylvain HAJRI
@navlys__
Passionate about #OSINT. Founder of @Epieos, a reverse email/phone lookup OSINT tool. @_leHACK_ #OsintVillage Founder, @OsintFr co-founder.
Jean-Romain
@jromaing

Gergely Kalman
@gergely_kalman
bug bounty hunter I guess @[email protected] | gergelykalman.bsky.social
Charles Fol
@cfreal_
previously @ambionics @LexfoSecurite – blogs: ambionics.io/blog blog.lexfo.fr cfreal.github.io
stacksmashing
@ghidraninja
Security researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of @hextreeio. Contact: [email protected]
hextree.io
@hextreeio
🌱 Grow your cybersecurity skills with concise and well-edited video courses - in early-access, sign-up now! Created by @LiveOverflow and @ghidraninja.
Miguel Yusim
@yubiguel
CTO of @bluefrostsec Organizer of @offensive_con
Jael Koh
@_jaelkoh
Security Research @pixiepointsec