hacker, poster, weird machine mechanic
https://chompie.rip
Kubernetes SIG Security Co-Chair, but this account is mostly about Minneapolis right now.
Chop wood, carry water 💛
MSP feed info: https://bsky.app/profile/amityf.bsky.social/post/3l3frqadlo32h
Fuzzing; Vulnerability Research;
Deep Learning; Reverse Engineering
Training & Publications @ http://fuzzing.io
Hacking the planet since 1995
Undercurrents.io BOFH
I'll stop the world and melt with you
Security Engineering and Architecture at Apple. Vulnerability research. Embedded systems in Swift. Alumnus RPISEC. Previously ReSwitched. 🏳️🌈
Security @Google, Personal Account.
Security researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of
hextree.io. Contact: contact@stacksmashing.net
Retired DEFCON CTF org.
Shellphish Captain Emeritus.
ASU Prof.
angr hacker.
pwn.college sensei.
Looking for students/interns!
https://yancomm.net
https://github.com/zardus
https://defcon.social/@Zardus
Open source privacy and security focused mobile OS with Android app compatibility.
https://grapheneos.org/
Security Engineer @ Cloudflare,
ex-Google ISE,
I use bad software and bad machines for the wrong things.
My writing: https://carstein.github.io
Software Security @ MPI for Security and Privacy
Spokesperson for Max Planck Research Group Leads at CPTS
PhD @NUS, Dipl.-Inf. @TUDresden
Research Group: http://mpi-softsec.github.io
Substack: http://lcamtuf.substack.com/archive
Homepage: http://lcamtuf.coredump.cx
Security researcher/programmer ⁂ Managing director @ HexArcana ⁂ @DragonSectorCTF founder ⁂ he/him
We want to make fuzzing better and better
Follow for updates on AFL++ & LibAFL
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
mobile security / symbolic execution . he / him
Native Hawaiian Hacker | Prev Co-captain of @Shellphish | PhD Student in Comp Sci @ASU l Decompiler Research | https://mahaloz.re
Binary Security Researcher & Trainer
Website: https://synthesis.to
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of OpenSecurityTraining2 https://ost2.fyi
【DΞCOMPILΞ NΣVΞR】
Android Red Team @google
Fuzzing @aflplusplus.bsky.social
CTF @enoflag
(opinions my own)
Fuzzing & stuff https://hexgolems.com
Firmware Security • Embedded Systems • AI x Infosec •
Researcher @binarly • PhD Candidate @TUBerlin •
Capturing Flags with ENOFLAG
Working on Project Zero, Big Sleep, and V8 Security. Personal account.
official Bluesky account (check username👆)
Bugs, feature requests, feedback: support@bsky.app