The Center for Threat-Informed Defense
center-for-threat-informed-defense
An R&D organization focused on advancing the state of the art and the state of the practice in threat-informed defense.
United States of America
cts
stong
Security researcher and co-founder @Zellic. CTFs with @perfectblue.
Previously @Vector35, @sslab-gatech.
@Zellic 0x4141414141414141
Can Bölük
can1357
Security researcher and reverse engineer.
Interested in Windows kernel development, low-level programming, static program analysis and cryptography.
The Netherlands
Dreg
therealdreg
Senior Malware Researcher, OS Internals, C/C++, assembler, reversing, forensics, hardware hacking, x86_64, AVR, ARM & PIC
rootkit.es Spain
Sina Karvandi
SinaKarvandi
Debuggers enthusiast. Interested in low-level programming. I work on @HyperDbg debugging solutions.
Tom Hudson
tomnomnom
Open-source tool maker, trainer, talker, fixer, eater, not really a sheep. He/him.
sbtUK Yorkshire, UK
Elias Bachaalany
0xeb
** YouTuber ** Author: Batchography ** Co-author: Practical Reverse Engineering &
Antivirus Hacker's Handbook.
Peter Kacherginsky
iphelix
Blockchain, Reverse Engineering, Malware Analysis, Exploit Development, and other security topics.
San Francisco
Andrea Fioraldi
andreafioraldi
Writing fuzzers to find assertion errors and null ptr derefs. Trying to do a Kamehameha since I was 4.
Antibes, France
Pedram Amini
pedramamini
CTO at @InQuest. Previously founded the ZeroDayInitiative.com and OpenRCE.org. @pedramamini on Twitter.
@InQuest Austin, TX