Vulnerability researcher | Fuzzing | Anything low-level excites me | Admin @ https://0x00sec.org | My tweets are my own | Blog: https://0x434b.dev
Director of Research @ Interrupt Labs
He/Him
Born at 340ppm
Vulnerability Researcher | Exploit Developer (speaker 3x at DEF CON)
Software Security @MPI, PhD @NUS, Dipl.-Inf. @TUDresden.
Research Group: http://mpi-softsec.github.io
Cyber Response Italian Supercazzola Technology Officer at
@mhackeroni Inc. Writing your favourite fuzz testing tools with
@aflplusplus. Security research at ο£Ώ.
Security Engineer @ Cloudflare,
ex-Google ISE,
I use bad software and bad machines for the wrong things.
My writing: https://carstein.github.io
K8s SIG Security Co-Chair
container escape artist
aurora chaser
goose in the machine
Minneapolis. They/them.
Stay punk π΄
President of @opensrcsec, developer of @grsecurity
Personal account
VR @ Synacktiv, low level security enthusiast
https://voydstack.re/
Security Researcher at Google Project Zero. 0-days all day. Love all things reverse engineering. she/her
Vulnerability Research is fun
Security researcher/programmer β Managing director @ HexArcana β @DragonSectorCTF founder β he/him
Trend Zero Day Initiativeβ’ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (β€οΈprogram/code analysis)ππ @adhsec on hellsite, they/them, enby, #AuDHD
Java/Android Vulnerability Researcher. 0xACED. Ex-Apple. Posts are my own.