Close enough! AMA: docs.google.com/forms/d/e/1F...
I'll do a live stream answering questions some time soon :)
08.07.2025 13:24 โ ๐ 6 ๐ 4 ๐ฌ 0 ๐ 1
"Bluesky is dead"
Meanwhile on Bluesky:
12.06.2025 20:08 โ ๐ 16801 ๐ 3174 ๐ฌ 334 ๐ 207
22.11.2024 21:47 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
CTF player with The Flat Network Society - bug bounty & web security research
ใ๏ผคฮ๏ผฃ๏ผฏ๏ผญ๏ผฐ๏ผฉ๏ผฌฮใ๏ผฎฮฃ๏ผถฮ๏ผฒใ
Android Red Team @google
Fuzzing @aflplusplus.bsky.social
CTF @enoflag
(opinions my own)
Fuzzing; Vulnerability Research;
Deep Learning; Reverse Engineering
Training & Publications @ http://fuzzing.io
Hacking the planet since 1995
Undercurrents.io BOFH
I'll stop the world and melt with you
Substack: http://lcamtuf.substack.com/archive
Homepage: http://lcamtuf.coredump.cx
Software researcher at https://cispa.de, working on #Fandango, #S3, #FuzzingBook, #DebuggingBook. Testing, debugging, analyzing, and protecting software for a better world. Find me at https://andreas-zeller.info/
Software Security @MPI, PhD @NUS, Dipl.-Inf. @TUDresden.
Research Group: http://mpi-softsec.github.io
"I'm interested in all kinds of astronomy."
https://scrapco.de
Mostly cross-posting from Fediverse: @buherator@infosec.place
fuzzing enjoyer
@novafacing@haunted.computer
Security @Google, Personal Account.
Fuzzing & stuff https://hexgolems.com
Cyber Response Italian Supercazzola Technology Officer at
@mhackeroni Inc. Writing your favourite fuzz testing tools with
@aflplusplus. Security research at ๏ฃฟ.
We want to make fuzzing better and better
Follow for updates on AFL++ & LibAFL
Security researcher with an interest in formal methods.
Building fuzzers @ Interrupt Labs |
Teaching @ Australian National University
https://adrian-herrera.com
melee, cybersecurity, leftism
Privacy Researcher based in Gรถttingen, Germany, previously working on Kernel Fuzzing @ TU Darmstadt.
AI researcher at XBOW. Security, RE, ML. PGP http://keybase.io/moyix/
Vulnerability researcher | Fuzzing | Anything low-level excites me | Admin @ https://0x00sec.org | My tweets are my own | Blog: https://0x434b.dev