
Tobias Scharnowski
@scepticctf
Embedded Firmware Fuzzing at fuzzware.io. Ph.D. student. Working on advancing embedded systems software security.
ID: 3184992317
19-04-2015 23:08:11
143 Tweet
1,1K Followers
405 Following

Dave Aitel
@daveaitel
Cyber Security Researcher | Policy Analyst | Partner at Cordyceps.Systems | @[email protected]
Brendan Dolan-Gavitt
@moyix
Building offsec agents: xbow.com Associate Prof, NYU Tandon (on leave). PGP keybase.io/moyix/ MESS Lab: messlab.moyix.net
mdowd
@mdowd
Internet Hacker. Founder of @vigilant_labs. Previously, co-founder of Azimuth Security (now L3Harris Trenchant)
Andreas Zeller
@andreaszeller
Software researcher at @CISPA. Testing and analyzing software for a better world. Find me at @[email protected] or @[email protected].
joernchen
@joernchen
Your mom's favorite hacker. Also at @[email protected]
Pedram Amini
@pedramamini
Repeat founder, investor, hacker. Chief Scientist @OPSWAT. Advisor @ExodusIntel & @0dinai, Previously created @theZDI and OpenRCE. NYC born, Austin transplant.
Ange
@angealbertini
Reverse engineer, file formats expert. Corkami, CPS2Shock, PoC||GTFO, Sha1tered, Magika... Security engineer @ Google. He/him.
blasty
@bl4sty
irresponsible disclosure aficionado
Martin Thompson
@martinjthompson
embedded cybersecurity, electronic design, FPGAs, software, Linux. Also plays Linnstrument and WX5
Efrén López
@efren_lopezm
Computer Science Ph.D. candidate at Texas A&M University - Corpus Christi. Working on Cyber-Physical Systems Security.
Gynvael Coldwind (@gynvael.bsky.social)
@gynvael
security researcher/programmer/director @ HexArcana Cybersecurity GmbH ⁂ @pagedout_zine ⁂ @DragonSectorCTF ⁂ youtube.com/@GynvaelEN ⁂ ex-Google ⁂ he/him
Trend Zero Day Initiative
@thezdi
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Zuk
@ihackbanme
Mobile & Security Research | Founder @ZecOps (Acq. by JAMF) 🐊 & @ZIMPERIUM (Acq.) | #FreeTheSandbox✌ | ❤️ Chess | My random thoughts, only some are accurate.
Joshua J. Drake
@jduck
Securing the future through modern technology. Founder and Software Security Specialist at @magnetitesec
Thijs Alkemade
@xnyhps
Security researcher @ @Computest @sector7_nl. infosec.exchange/@xnyhps
Orange Tsai 🍊
@orange_8361
This is 🍊
Nic Losby
@blurbdust
Red Teamer | He/Him | Obligatory opinions don't reflect employer | Occasional terrible developer of tools | PGP: 826087AF5C6653F0BAACA1C5E4CE747DEA558A13
ϻг_ϻε
@steventseeley
Artist disguised as a logician. Pwn2Own Winner.
Philippe Teuwen
@doegox
If you can't root it you don't own it. doegox infosec exchange
Shift
@shiftreduce

Lukas Seidel
@pr0me
Firmware Security • Embedded Systems • AI x Infosec • Researcher @binarly_io • PhD Candidate @TUBerlin • Capturing Flags for @ENOFLAG
Alisa Esage Шевченко
@alisaesage
Nationstate-Certified Cybersecurity Threat • Architect of Evil Pointer Arithmetic • Owner of Zero Day Engineering
Jacob Soo
@_jsoo_
Founder starlabs.sg
Michał Kowalczyk 🇺🇦
@dsredford
reverse-engineering / low-level security @DragonSectorCTF vice-captain / Invisible Things Lab Mastodon: @[email protected] bsky: @mkow.bsky.social
Kaijieguigui
@kaijieguigui
Cybersecurity manager, former vulnerability researcher. MSRC MVR Top 100 & Chrome VRP Top 50 (2022)
Grant H
@digital_cold
Mobile security researcher. Previously @Qualcomm product security. @UF Ph.D, @UCF B.S. Opinions my own keybase.io/ghh 🦋: @digitalcold
Maxwell ꓘ Dulin (Strikeout)
@dooflin5
God First ✞ | Web3 & Web2 Security Researcher (Hacker) at @asymmetric_re | Gonzaga U & Centralia HS Grad | Wiffleball with @ctownwiffle | Dodgeballer |
Samuel Groß
@5aelo
V8 Security technical lead. Previously Project Zero. Personal account. Also @[email protected] and saelo.bsky.social
Andrey Konovalov
@andreyknvl
Security engineer at xairy.io. Focusing on the Linux kernel. Maintaining @linkersec. Trainings at xairy.io/trainings.
CherryWorm
@carryworm
Ex comp sci grad student, now physics undergrad at Heidelberg University | Co-founder Neodyme | Racing in GT4 Winter Series for W&S Motorsport | Chaotic neutral
Brandon Falk
@gamozolabs
I find and exploit 0day, develop OSes, hypervisors and emulators, design massively parallel data structures and code, and do precision machining! Optimization❤️
Khaled Nassar
@notkmhn
computing dude
fidgeting bits
@fidgetingbits
voice coding nix junkie
LiveOverflow 🔴
@liveoverflow
wannabe hacker... he/him 🌱 grow your hacking skills @hextreeio
zhiniang peng
@edwardzpeng
Cyber Security & Cryptograhpy
Alex Neff
@al3x_n3ff
Pentester | Maintainer of NetExec
b1ack0wl
@b1ack0wl
0day Researcher @ ████████████ / Baker / 0wl
Tim Blazytko
@mr_phrazer
Binary Security Researcher, Chief Scientist at emproof.com and Trainer. Also at bsky.app/profile/mrphra…
Alex Plaskett
@alexjplaskett
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
h0mbre
@h0mbre_
# Exploit Reliability Engineer # Developing a full-system snapshot fuzzer: github.com/h0mbre/Lucid # Avi: instagram.com/chingyeh005
Matteo Rizzo
@_matteorizzo
Security engineer at @google, CTF player for @0rganizers and @polygl0ts Personal account. Mastodon: @[email protected]
Real World CTF
@realworldctf

kylebot
@ky1ebot
CTF player @Shellphish | PhD Student @ASU | @angrdothorse dev | Author of how2heap | Vulnerability Research Hobbyist | @[email protected]
Project Zero Bugs
@projectzerobugs
A bot that posts the latest blog posts and disclosures from Google's Project Zero
Andrea Fioraldi
@andreafioraldi
Cyber Response Italian Supercazzola Technology Officer at @mhackeroni Inc. Writing your favourite fuzz testing tools with @aflplusplus. Security researcher.
INSU YUN
@insu_yun
Associate Professor (Untenured) at KAIST EE #KAIST #HackingLab #GoN
sam4k
@sam4k1
pwning kernels & blogging on os internals 🌱
Xion
@0x10n
CMU CSD PhD student / 2024 Top#0 Chrome VRP Researcher / Winner of Pwn2Own Vancouver '24, TyphoonPWN '24, DEFCON 31 CTF, ... / PPP, KAIST GoN '18, @zer0pts
SeTcbPrivilege
@setcbprivilege

Florian Magin
@0x464d
Applied Decompilation Research @FraunhoferSIT Organizing @WizardsOfDos, formerly played with @allesctf
Neodyme
@neodyme
We secure software with deep-dive audits, cutting-edge research, and in-depth trainings. Secure your solana program with Riverguard @ riverguard.io 🏞️💂
sintemal
@siintemal
Co-Founder and Security Researcher @neodyme, CS @TU_Muenchen
r0bre | Accretion.xyz
@r0bre
solana security officer | ceo & chief solana auditor @accretion_xyz | dm for audits
Fabian Thomas
@fth0mas
PhD Student @CISPA Helmholtz Center for Information Security.
Charles Fol
@cfreal_
previously @ambionics @LexfoSecurite – blogs: ambionics.io/blog blog.lexfo.fr cfreal.github.io
Rairosu
@rairosu1
CTF stuff @allesctf, @xtal_ctf, @Sauercl0ud and @Fluxfingers
afang
@afang5472
Devoting to Vulnerability Research Automation, currently targeting Windows. MSRC MVR 2020,2021,2024. BlackHat USA/Europe/Asia/Typhoo Speaker, love pwn IDA Pro:)
CheolJun Park
@cheoljun_p
Postdoc, Electrical Engineering, Cellular Security, KAIST SysSec Lab
🤷♂️
@floesen_

SinSinology
@sinsinology
Pwn2Own 20{22,23,24,24.5,25}, i look for 0-Days but i find N-Days & i chase oranges 🍊
tunn3l
@_tunn3l
ctf @Fluxfingers Fighting Long Covid for 2 years now. Donate to support science in ME/CFS and LC: mecfs-research.org/en/
Marcel
@0ddc0de
PostDoc @HexhiveEPFL working on mobile security. CTF-Enthusiast @polygl0ts/@0rganizers. Former @shellphish and @fausecteam. Co-founder of @faustctf.
car0
@r41nycl0uds
random bag of potatoes
mxhdrm
@_mxhdrm
ctf @Fluxfingers firmware padawan and byte digger chaos.social/@mxhdrm
Diego Zaffaroni
@xenomit_
Security Engineer @Google | CTF player @mHACKeroni and @towerofhanoi
Eviatar Gerzi
@g3rzi
Security Researcher interested in reversing, malware analysis, CTFs, PrivEsc vulns, and DevOps security (docker and k8s) ;)
RBTree
@rbtree_
Rev & Crypto | Work @theori_io @dreamhack_io | CTF @pb_ctf | HypwnLab | DEFCON CTF 2017-2024 Finalist
localo
@_localo_
I play ctf @allesctf
Wei-Cheng Wu
@spencerwuwu
隨性隨筆隨行攝影