~ xio
@xiosec
Security Researcher
ID: 1267352453110026242
http://xiosec.github.io 01-06-2020 07:09:42
66 Tweet
34 Followers
193 Following
NULLCON
@nullcon
International #Security Conference, Training & Exhibition Platform - the neXt security thing! ✈️Up next #NullconHYD
Gynvael Coldwind (@gynvael.bsky.social)
@gynvael
security researcher/programmer/director @ HexArcana Cybersecurity GmbH ⁂ @pagedout_zine ⁂ @DragonSectorCTF ⁂ youtube.com/@GynvaelEN ⁂ ex-Google ⁂ he/him
Alexandre Borges
@ale_sp_brazil
Vulnerability Researcher and Exploit Developer (b. sky: alexandreborges)
Soroush Dalili
@irsdl
Hacker (ethical), web appsec specialist, trainer, tools builder & apps breaker, @SecProjectLtd founder 🕸️BurpSuite.Ninja🥷 🍏A dad-joke maker🍐
Axel Souchet
@0vercl0k
¯\_(ツ)_/¯, blogging on doar-e.github.io and posting codes on github.com/0vercl0k.
Duncan Ogilvie 🍍
@mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
ϻг_ϻε
@steventseeley
Artist disguised as a logician. Pwn2Own Winner.
itszn
@itszn13
Amy | Security researcher | stackchk.fail/ctf.txt | bsky: nyanbox.stackchk.fail | LLM ART: bsky.app/profile/altern…
stephen
@_tsuro
@v8js security, CTFs and CPU vulnz. LCHL. @[email protected]
Jonathan Salwan
@jonathansalwan
Program analysis, reverse engineering and vulnerability research at @Apple SEAR. Some other stuff on github.com/JonathanSalwan
Bad Sector Labs
@badsectorlabs
Cybersecurity news, techniques, exploits, and tools every week at blog.badsectorlabs.com 🐘 @[email protected]
Andrea Palazzo
@cogitoergor00t
Android researcher & Director @prdgmshift. prev: LIST_POISON2 (dead000000000200), list_del corruption. Founder @truel_it
Synacktiv
@synacktiv
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
Jones Baraza
@jonesbaraza
Global Award Winner | Founder @ctf_room & @SpaceYaCyber | Volunteer @blackincyberco1 | Supporting civic groups with #OpSec & #AntiSurveillance strategies.
clearbluejar
@clearbluejar
Security Researcher | Founder @clearseclabs | Research | Learn | Write | Code | Repeat | cve-north-stars.github.io - patchdiffing | Author of #ghidriff
Paolo Stagno (VoidSec)
@void_sec
Director of Research @Crowdfense. Windows Vulnerability Researcher and Exploit Developer, ex-@XI_Research
Shellphish
@shellphish
Capture the Flag Team from UC Santa Barbara's SECLAB and Arizona State University's SEFCOM. DARPA Cyber Grand Challenge 3rd Place. Phrack author. Let's hack!
Andrey Konovalov
@andreyknvl
Security engineer at xairy.io. Focusing on the Linux kernel. Maintaining @linkersec. Trainings at xairy.io/trainings.
Ny4aa
@nyaaaaa_ovo
Write some shit code. CTF with @r3kapig. Do shit security research. Currently at UC San Diego.
CODE WHITE GmbH
@codewhitesec
Red Teaming. Security Research. Continuous Penetration Testing. Threat Intelligence.
Dillon Franke
@dillon_franke
Fuzzing, MacOS, vuln research @Google. Jesus Follower
Brandon Falk
@gamozolabs
I find and exploit 0day, develop OSes, hypervisors and emulators, design massively parallel data structures and code, and do precision machining! Optimization❤️
Vector 35
@vector35
Makers of the Binary Ninja - Reverse Engineering Platform. binary.ninja/twitter Also posting at infosec.exchange/@binaryninja
Zero Day Engineering
@zerodaytraining
State-of-the-Art Offensive Research & Consulting • Mirror: t.me/zerodaytraining • Discord: discord.gg/GGsxkBNFtF
Shellter
@shellterproject
AV Evasion Artware || Shellter v7.2 - Executable SHA256: ea07a52eca82b6383c7aa224652e55e0d1701f0779def736977ecadff819049c || Shellter Elite || Dev: @kyREcon
r3kapig
@r3kapig
United team of Eur3kA && flappypig
watchTowr
@watchtowrcyber
If there’s a way to compromise an organization, the watchTowr Platform will find it.
Interrupt Labs
@interruptlabs
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
Khoa Dinh
@_l0gg
Horizon3 Attack Team
@horizon3attack
@Horizon3ai Attack Team | Security Research | Exploit Dev | TTPs
BunkyoWesterns
@bunkyowesterns
そんなあなたにBunkyoWesterns
Kim Dong-uk
@justlikebono
@pksecurity_io | KAIST Hacking Lab | Microsoft MVR
TheZDIBugs
@thezdibugs
Checks for high severity, 0day, or Pwn2Own related advisories published by @thezdi
chumen77
@chumen777
MalDev Academy
@maldevacademy
A comprehensive module-based malware development course providing fundamental to advanced level knowledge
iOS Nemes1s
@iosnemes1s
Software developer, iOS Security researcher, software cracker and Broque Ramdisk PRO Creator.
L3ak
@l3akctf
International CTF team of cybersecurity researchers and enthusiasts 🃏 CTFtime: ctftime.org/team/220336 Recruitment Form: forms.gle/74u5gGeSbsgp4y…
Hack@Sec Official
@hackasec
"Looking skilled web guy and OSINT player to join our team"—DM now! CTF Team: ctftime.org/team/135426 For Sponsorship: [email protected]
exploits.club
@exploitsclub
A VR, RE, and Exploit Dev weekly newsletter | Join the club Contact: [email protected]
emma
@carrot_c4k3
cyber torture pioneer. bug bounty billionaire. most controversial pwn2own winner (contested). en🇺🇸/ru🇰🇿. she/her 🏳️⚧️
Epsilon
@epsilon_sec
Security research. Event planning. Very few clicks.
AnMioLink
@anylink20240604
404.02 Undefined Request Behind the fog where the link lead. Ver. Confusus
D_C4ptain
@d_c4ptain
Cybersecurity | CTF player @fr334aksmini | Cybershujaa 4.0 | Ex-Team Lead @DscRongo | Shotokan | Bikes | Astronomy
Тsфdiиg
@tsoding
Recreational Programming - twitch.tv/tsoding - youtube.com/@TsodingDaily - youtube.com/@Tsoding ⠀⢀⣰⣾⡿⣶⣿⠿⣶ ⢠⣼⣿⣿⣷⣿⣿⣶⠉ ⢸⣿⣿⣿⣿⣿⣿⠀⠀
swing
@bestswngs
Security Researcher of @ChaitinTech | CTF Player @FlappyPig and @r3kapig Focus on PWN/Reverse infosec.exchange/@swing Blog: bestwing.me
SSD Secure Disclosure
@securiteam_ssd
SSD provides the support you need to turn your experience uncovering security vulnerabilities into a highly paid career. [email protected]
maxpl0it
@maxpl0it
Principal Vulnerability Researcher at @InterruptLabs. Occasional Pwn2Owner
rand0m
@crypt_3n
{breaking,making} stuff, CTF(@BunkyoWesterns,@ProjectSEKAIctf), RIP
TyphoonCon🌪️
@typhooncon
TyphoonCon is an annual all Offensive Security Conference, taking place May 26-30, 2025 in Seoul, South Korea 🌪️
Fraize
@fraize__
{{ Infosec Engineer }} | PenTester | CTF player @fr334aks | @hackthebox_eu Ambassador | @hackthebox_ke Meetup Organizer