Red Team / Security researcher at @synacktiv.com
linktr.ee/rustyphasm
"Vulnerability researcher" doing BB on free time (http://yeswehack.com/hunters/chackal) Also doing some Reverse on many targets but find no vuln 😒
Blogpost: https://medium.com/@chackal
IT & Hacking https://xark.es/
CTF player with The Flat Network Society - bug bounty & web security research
Blogging at https://nastystereo.com
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of OpenSecurityTraining2 https://ost2.fyi
Lead developer | Bug hunter (approximately every 3 months)
> https://aeth.cc
Co-Founder @shielder.com
CTF Player jbz.team
Cliff Jumping Lover (23mt max so far)
Web security researcher, team bi0s
CVE-2024-8143, CVE-2024-8550, CVE-2024-10649
Infosec addicted IT guy 🕵️♂️👨💻 | HTB Guru | Researcher & Pentester 🖊️ | White-Hat 🎩 | Bugs find me 🪲 | Part of the awesome #kaeferjaeger crew 💥
Web security research from the team at PortSwigger.
About me?
| Website: https://mizu.re
| Tool: https://github.com/kevin-mizu/domloggerpp
| Teams: @rhackgondins, @FlatNetworkOrg, @ECSC_TeamFrance
| From: https://twitter.com/kevin_mizu
Journaliste, aux manettes de la newsletter cybercrime Pwned | gabrielthierry@protonmail.com https://linktr.ee/gabrielthierry
Former RE team lead
@synacktiv - Former @AirbusSecLab lead
Collector of Quote
Security Researcher with @GHSecurityLab. CTF #int3pids. Opinions here are mine!
Leading Google's web security team.
Passionate about web security and making secure-by-default web development the norm. Contributed to web platfom security features like CSP, Fetch Metadata, COOP and Trusted Types.
Security Engineer @ Cloudflare,
ex-Google ISE,
I use bad software and bad machines for the wrong things.
My writing: https://carstein.github.io
Blog feed for https://dustri.org/b
Also available at https://infosec.exchange/@jvoisin