deeply and importantly talented
Former intel, now academic @NDU_CIC, @TheKrulakCenter, @SIWPSColumbia @ColumbiaSIPA, @CyberStatecraft, @ElliottSchoolGW, @PAISWarwick. Apolitical, views=own
Touring sourcecodes. ARIN ISP Operator (AS400671). Retired CTF Player.
vulnerability researcher, apple, embedded, linux
twitter: @impost0r_
fediverse: @impostor@funami.tech
Kernel/hypervisor engineer @awscloud EC2. Hobby @checkra1n. On Mastodon @ http://mastodon.social/@never_released.
aka itszn (itszen)
0xffff000041414141
Security researcher creating pwnable puzzles
https://infosec.exchange/@nyanbox
https://x.com/itszn13
LLM Art: https://bsky.app/profile/alternet.site
https://github.com/blacktop
Substack: http://lcamtuf.substack.com/archive
Homepage: http://lcamtuf.coredump.cx
busy building stuff. likes: offensive security, LLMs, and dumb memes. prev: research scientist @ OpenAI / CS PhD @ Harvard / cofounded DEF CON AI Village
A circus artist with a visual studio license
Hacker. Ascetic. Phrack author. The most technical boy in town.
pwning kernels & blogging on os internals 🌱
hacker, poster, weird machine mechanic
https://chompie.rip
Security Researcher at Google Project Zero. 0-days all day. Love all things reverse engineering. she/her
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker.
Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
意志 / Antiquarian @ IBM Adversary Services / Ex-TORE ⚔️🦅 / I rewrite pointers and read memory / AI Psychoanalyst / Teaching
at labs.calypso.pub