TrendAI Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
VR. Can cook a decent Cacio e Pepe. Physicist in a former life.
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
www.interruptlabs.co.uk
Vulnerability research, cryptography, FOSS, finance and random stuff.
Leading Cellebrite's iOS research.
Dad, Vulnerability Research, Packet connoisseur. He/Him. Cyber Security Architect @greynoise.bsky.social
, DM's open. Top percentage Rattata. #cve #infosec #cybersecurity
https://remyhax.xyz/
Security Engineer @ Cloudflare,
ex-Google ISE,
I use bad software and bad machines for the wrong things.
My writing: https://carstein.github.io
Paged Out! is a free magazine about programming, hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics. Always accepting submissions of one-page articles.
Fuzzing; Vulnerability Research;
Deep Learning; Reverse Engineering
Training & Publications @ http://fuzzing.io
Hacking the planet since 1995
Undercurrents.io BOFH
I'll stop the world and melt with you
aka itszn (itszen)
0xffff000041414141
Security researcher creating pwnable puzzles
https://infosec.exchange/@nyanbox
https://x.com/itszn13
LLM Art: https://bsky.app/profile/alternet.site
Security Researcher at Google Project Zero. 0-days all day. Love all things reverse engineering. she/her
reverse-engineering / low-level security
Dragon Sector CTF vice-captain, Invisible Things Lab
Mastodon: @redford@infosec.exchange
Also known as Redford
Security @Google, Personal Account.
Interested in iOS/macOS internals/security...
Working on Project Zero, Big Sleep, and V8 Security. Personal account.
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker.
Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
Security researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of
hextree.io. Contact: contact@stacksmashing.net
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.