unsecurity engineer
exploiting, reversing, gaming, coffee
Exploit Dev @interruptlabs.bsky.social
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
www.interruptlabs.co.uk
Fond of reverse engineering and software development.
Doing security engineering at some company.
CyberSecurity student at TU Eindhoven - CTF with https://superfl.at / https://org.anize.rs
Faculty at @CISPA. Research on embedded systems security. Mastodon: AliAbbasi@infosec.exchange
Software security engineer and trainer @ tandasat.github.io
Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc) ; https://hasherezade.net
hacker, poster, weird machine mechanic
https://chompie.rip
Cofounder & CEO @infosectcbr.bsky.social | Organiser @bsidescbr.bsky.social
Working on Project Zero, Big Sleep, and V8 Security. Personal account.
android/linux kernel @ Vigilant Labs | ctfs (pwn) w/ CoR + ELT
mobile security / symbolic execution . he / him
A circus artist with a visual studio license
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker.
Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
C++ developer specializing in source and binary program analysis and transformation.
Memory Corruption, iOS, Swift, LLVM, CTF, old man stuff
NYC
Fmr DARPA Program Manager | Fmrly Organizing DEF CON CTF with Nautilus | RPISEC Alumna | Personal account, opinions my own, RT ≠ endorsement