The largest collection of malware source code, samples, and papers on the internet.
Password: infected
(unofficial, this is a bot! Maintained by @yjb.bsky.social, the bot can't handle retweets, video, and maybe a few other things)
Security for Google Kubernetes Engine. Former pentester, DFIR and OS X security
he/him
Security, privacy, respect. Was the Twitter CISO until it was terrible. Now LinkedIn CISO. they/them
@0xMatt on Twitter
Rescue, DFIR, Cello and Birds
Cybersecurity nerd; #DFIR @ Google by day; FOSS, threat intel and malware analysis by night. Investigator, coder, terrible sense of humor.
https://yeti-platform.io and more (github.com/tomchop)
views are my own โข he/him โข tomchop.me
debugging, v: the process of inserting printf statements into code until one's errors reveal themselves
๐ CEO Stairwell | Built to outsmart bad guys
๐ป Ex-Google | Co-founder of Chronicle Security
๐ Snowboard fanatic | Burton loyalist
๐จโ๐งโ๐ฆ Dad | Startup life meets kid vibes
๐ถ Epic music loverโstartup grind meets โThe Greatest Showโ energy
DMs open
@volatilityfoundation.org Core Dev | Art of Memory Forensics co-author | DFIR trainer and enthusiast | Director of Adversary Tactics @huntress.com
Aussie security / tech guy.
Google Threat Intelligence. Co-founder Threat Analysis Group (TAG). Tweets are my own not my employers.
Detection & Response, Digital Forensics, SOAR, Information Security, Golang, Python
Substack: http://lcamtuf.substack.com/archive
Homepage: http://lcamtuf.coredump.cx
Philadelphian in Cascadia. Vociferous champion for Oxford commas, two spaces after a period, and ellipses. I break into buildings. ๐
"Even if the world were ending tomorrow, I would still plant a tree." ๐ฒ
(he/they)
computer security person. former helpdesk.
cDc/hack.xxx/veilid
Support Veilid! Badge: ๐
www.veilid.com
Merch at: @hack.xxx
he/him
Americaโs Finest News Source. A @globaltetrahedron.bsky.social subsidiary.
Get the paper delivered to your door: membership.theonion.com
CTO of Microsoft Azure, author of novels Rogue Code, Zero Day and Trojan Horse, Windows Internals, Sysinternals tools. Opinions are my own.
Aka @c_c_krebs over there