Samuel Chevet
@w4kfu
Dougall
@dougallj
he/they | mastodon: mastodon.social/@dougall / @[email protected]
Alex Ionescu
@aionescu
Chief Technical Innovation Officer @crowdstrike. Windows Internals author and trainer. He/Him. RTs are not endorsements, opinions are my own.
Tavis Ormandy
@taviso
Vulnerability researcher at Google. This is a personal stream, opinions expressed are mine. I'm also @[email protected]
Alex Matrosov
@matrosov
🔬Founder & CEO @Binarly_io, #codeXplorer, #efiXplorer, @REhints and "Rootkits and Bootkits" book. Previously worked at Nvidia, Cylance, Intel, ESET, Yandex.
bartavelle
@bartavelle
Aleksei Kulaev
@flat_z
Console hacker, former Kaspersky Team Lead of Exploits & Network Threat Detection, security researcher. For tips (thx!): ko-fi.com/flatz
blasty
@bl4sty
irresponsible disclosure aficionado
Robert Yates
@yates82
Doing compiler magic at Quarkslab Passionate about Reverse Engineering and Binary Analysis. - past developer of DRM for Sony(SecuROM 7+)/Denuvo
Gynvael Coldwind (@gynvael.bsky.social)
@gynvael
security researcher/programmer/director @ HexArcana Cybersecurity GmbH ⁂ @pagedout_zine ⁂ @DragonSectorCTF ⁂ youtube.com/@GynvaelEN ⁂ ex-Google ⁂ he/him
Maurice Heumann
@momo5502
🐍 Developer & Reverse Engineer. My girlfriend rates me 4/5 stars
Petr Beneš
@petrbenes
upper-mid-low-level. DMs open.
UnKnoWnCheaTs
@unknowncheats
The oldest game cheating forum in existence. We encourage an open, free and collaborative environment.
Trend Zero Day Initiative
@thezdi
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Erik Pistelli
@erikpistelli
CEO of Cerbero Labs (@cprofiler), creator of Cerbero Suite and Cerbero Engine, former developer of IDA Pro and creator of utilities such as CFF Explorer.
tlk
@tlk___
Axel Souchet
@0vercl0k
¯\_(ツ)_/¯, blogging on doar-e.github.io and posting codes on github.com/0vercl0k.
Unreal Engine
@unrealengine
Unreal Engine is the world’s most open and advanced real-time 3D tool. Learn more about how to get started with #UE5: unrealengine.com/unreal-engine-5
Massimo
@rainmaker1973
Engineer. Selecting and curating pictures and videos trying to add context, source and explanation to science, tech, art and weather topics
matteyeux
@matteyeux
nso.group/@matteyeux
ϻг_ϻε
@steventseeley
Artist disguised as a logician. Pwn2Own Winner.
Heathcliff74
@heathcliff74xda
Developer of Windows Phone Internals - Windows Phone enthusiast / hacker
Jessy Campos
@__ek0
Reverse Engineering & Pwning addict.
Frédéric Perriot
@fperriot
Renaud Dubourguais
@_m0bius
Pierre Bienaimé
@pierrebienaime
blog.bienaime.info
Wololo
@frwololo
PlayStation and Nintendo security & Homebrew. Making S0ny nervous since 2008
Blacktop
@blacktop__
Synacktiv
@synacktiv
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
Can Bölük
@_can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.
angel_killah
@angel_killah
sixtyvividtails
@sixtyvividtails
Currently working as an independent GUID merchant. Fully licensed. I acquire, produce, and sell high-quality GUIDs.
Matteo
@fvrmatteo
Reversing & Coding
Adrien Guinet
@adriengnt
Head of Engineering / Quantum Security Group @sandboxaq. LLVM, C++, binary analysis and cryptography with 🧐 Also on @[email protected]
yrp
@yrp604
Romain THOMAS
@rh0main
No longer here. infosec.exchange/@rh0main bsky.app/profile/rh0ma discord.com/invite/jGQtyAY…
Brandon Falk
@gamozolabs
I find and exploit 0day, develop OSes, hypervisors and emulators, design massively parallel data structures and code, and do precision machining! Optimization❤️
Instructions
@x86instructions
Spectre Lake - Put Me In Your Pipeline
LiveOverflow 🔴
@liveoverflow
wannabe hacker... he/him 🌱 grow your hacking skills @hextreeio
john
@nyan_satan
demonic beast from another era (with F20.0) | infosec.exchange/@nyan_satan
Lucas Georges
@_lucas_georges_
Patch Friday
@patchfriday
The IT security webcomic
starlabs
@starlabs_sg
A Singapore company that discovers vulnerabilities to help customers mitigate the risks of cyber attacks. Organisers of @offbyoneconf
idatips
@idatips
Tips and tricks for everyone's favorite disassembler. Account not run by Hex-Rays.
windbgtips
@windbgtips
A collection of some tips & tricks for the world's best debugger
sigpwn
@ghidra_re
pwn feed
Anti-Cheat Police Department 🕵️
@anticheatpd
We specialize in gathering intelligence on cheats to detect and disrupt cheating vendors. We are not affiliated with anyone, this is voluntary work.
Ferib
@feribhellscream
something something security
Thalium Team
@thalium_team
blog.thalium.re Groupe Thales / Lutte Informatique / recherche de vulnérabilités / développements Red Team
IDontCode
@_xeroxz
Compilers, Math, Windows, Obfuscation, x86-64, Hardware Hacking, and everything in-between Cofounder @BackEngineerLab building codedefender.io
Hexacon
@hexacon_fr
Offensive security conference in the heart of Paris. 10-11th October 2025 Join our Discord server! discord.gg/S4tJ99aHYG
nicoski
@iksocin
Security enthusiast: RE, VR, exploits and stuff
REverse_Tactics
@reverse_tactics
Software reverse engineering & vulnerability discovery company.
Miasm
@miasmre
Project Zero Bugs
@projectzerobugs
A bot that posts the latest blog posts and disclosures from Google's Project Zero
The Old New Thing RSS Bot
@oldnewthingrss
Unofficial Twitter account for the Old New Thing RSS feed
gmh5225.eth
@gmhzxy
Beautiful vision, trust in the system, institutional constraints, and common prosperity. infosec.exchange/@gmh5225
r0da
@r0da__
(he, eax, zf, tree) RE, OSINT and other things. Writing things about RE on my blog. Currently : Lost in LLVM internals XMPP : r0da(at)jix(dot)im
Saar Amar
@amarsaar
Reversing, exploits, {Windows, Hyper-V, *OS} internals, mitigations. Apple SEAR. Opinions are my own. @[email protected]
Niklas B
@_niklasb
research @dfsec_com - @[email protected]
Quentin M
@0xdagger
Security Ninja @synacktiv
toshi
@piazzt
Security Engineer for MSFT; Member of @RPISEC | Icon: vimeo.com/214352663
Ian Beer
@i41nbeer