/usr/bin/nethack
-
11:42
(UTC +02:00) - http://www.williballenthin.com/
- @williballenthin@mastodon.social
Samuel Colvin
samuelcolvin
The Pydantic Stack: Pydantic Validation, Pydantic AI and Pydantic Logfire
@pydantic London, United Kingdom
Mahmoud Rusty Abdelkader
mahmoudimus
Cryptography, Reverse Engineering, Fintech and Privacy
United States
Chuong Dong
cdong1012
MSTIC Senior RE @ Microsoft. Former FLARE RE @ Mandiant. I do malware stuff.
Microsoft Atlanta, GA
Hiroshi Suzuki
herosi
A malware analyst, a forensic investigator, an incident responder, a researcher and a black hat speaker and trainer.
Internet Initiative Japan Inc.
Darren Burns
darrenburns
Creator of a few terminal-based developer tools, open-source enjoyer, core contributor to Textual 🐍
@monzo Edinburgh, Scotland
secret club
thesecretclub
secret club is a research collective that specializes in reverse engineering and binary exploitation.
Can Bölük
can1357
Security researcher and reverse engineer.
Interested in Windows kernel development, low-level programming, static program analysis and cryptography.
The Netherlands
Nicolas Falliere
nfalliere
(Reverse, Forward)-Engineer, Founder/Architect of JEB Decompiler - Twitter @jebdec
PNF Software SF Bay Area
Boris Larin
oct0xor
Playing video game consoles since 1991
Hacking video game consoles since 2010
Hunting in-the-wild 0-days since 2017
willem
nlitsme
Currently mostly programming in C++ and python.
Reverse engineering phone firmware since 2003.
Interested in everything.
@gsmk
@AlanOrlikoski
orlikoski
Senior Leader, Cloud, CI/CD, Digital Forensics, Incident Response, and Security Engineer who enjoys giving back to the community, teams, and people.
Nguyen Anh Quynh
aquynh
Reversing Trilogy: Capstone (capstone-engine.org), Unicorn (unicorn-engine.org) & Keystone (keystone-engine.org)
PreviousNext