Skip to content
@brainstorm
Roman Valls Guimera brainstorm
Working @umccr

University of Melbourne Melbourne, Victoria, Australia

@jevinskie
Jevin Sweval jevinskie
Senior Security Researcher, compilers/optimizations/[de]obfuscation, SCA, program analysis, NFC ninja, HW hacker w/ FPGA hammer Previously Apple Pay Security

Lafayette, Indiana

@Escapingbug
Anciety Escapingbug
My profile picture explains everything. Cheerleader of @Team-Eur3kA & @r3kapig. Toy Generator

北京某211大学 Azeroth

@br0kej
Josh Collyer br0kej
Algo Security Alchemist @ The Alan Turing Institute. PhD Researcher at Lboro Uni.

The Alan Turing Institute UK

@jasikpark
Caleb Jasik jasikpark
vibin'

@DefinedNet Texas

@novafacing
Rowan Hart novafacing

@intel Portland, OR

@AkechiShiro
Samy Lahfa AkechiShiro
Computer are full of assumption, acquiring knowledge of those is hard but necessary in security @NixOS @winapps-org @Athena-OS

France

@bdemick
Ben Demick bdemick
Principal Researcher of Things
@agnosticlines
agnosticlines
reverse engineering, program analysis and exploit dev | i ⭐ a lot of things, not a bot. Just use github as a personal search engine for cool projects

[object Object] /dev/kmem