Links related to Linux kernel security and exploitation.
Maintained by @andreyknvl.bsky.social and Alexander Popov.
Also on https://t.me/linkersec, https://x.com/linkersec, and https://infosec.exchange/@linkersec.
now: Assistant Professing™ in Software Practices Lab at UBC. was: postdoc MSR NYC, phd UC Berkeley. also at https://mastodon.acm.org/@cestlemieux. she/her.
not affiliated with Y Combinator, running on a pi in my basement
I play with vulnerabilities and exploits.
While this site initially showed promise, I've grown tired with its lack of improvement.
You'll find me @wdormann@infosec.exchange on Mastodon.
knuck if you buck
https://n0.lol
Founder of Azeria Labs, Trainer, Author of Blue Fox: Arm Assembly Internals & Reverse Engineering
Founder & CEO LutaSecurity @payequitynow MIT&Harvard visiting scholar, @MasonNatSec fellow, 1/2 Chamoru, 1/2 Greek all-American hacker
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker.
Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
Prof. @KU_Leuven | Research in Network & Software Security | Known for WPA2 KRACK attack, Dragonblood, and FragAttacks | Open to consultancy | Ex-Postdoc NYU
hacker, poster, weird machine mechanic
https://chompie.rip
I teach cryptography at Johns Hopkins. https://blog.cryptographyengineering.com
Fuzzing; Vulnerability Research;
Deep Learning; Reverse Engineering
Training & Publications @ http://fuzzing.io
Hacking the planet since 1995
Undercurrents.io BOFH
I'll stop the world and melt with you
Hacker. Ascetic. Phrack author. The most technical boy in town.
pwning kernels & blogging on os internals 🌱
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
official Bluesky account (check username👆)
Bugs, feature requests, feedback: support@bsky.app