Hex-Rays SA
@HexRaysSA
We are a hi-tech company focusing on binary software analysis. Our main products are IDA Pro and the Hex-Rays Decompiler.
Inquiries: https://t.co/3AkMrQmJgF
ID:1210549374960443396
http://www.hex-rays.com 27-12-2019 13:17:40
903 Tweets
6,8K Followers
45 Following
Alexandre Borges
@ale_sp_brazil
Vulnerability Researcher and Exploit DeveloperYarden Shafir
@yarden_shafir
A circus artist with a visual studio licenseJiří Vinopal
@vinopaljiri
Threat Researcher at Check Point @_CPResearch_ #DFIR #Reversing - All opinions expressed here are mine only. https://t.co/iWvwWF1AnNStephen Sims
@Steph3nSims
Perpetual Student | SANS Fellow | Musician | Braggart Hater | Gray Hat Hacking | VR | 🏂 | d3adc0de | oNLyHaCKeRs | https://t.co/CadJehomsUJoxean Koret (@[email protected])
@matalaz
سمووحخ ̷̴̐ خ ̷̴̐ خ ̷̴̐ خ امارتيخ ̷̴̐ خ 巴斯克恐怖 జ్ఞffective.Power لُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ 冗జ بٍٍٍٍََُُُِّّّْرٍٍٍٍََُُِِّّّْآٍٍٍَُّ🦠بٍٍٍٍََُُُِّّّْرٍٍٍٍََُُِoffensivecon
@offensive_con
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by @bluefrostsec @offensivecon.bsky.socialRolf Rolles
@RolfRolles
Static reverse engineering, deobfuscation, program analysis and formal verification, training, mathematics, compilers, functional programming, etc.DEF CON
@defcon
Hacking Conference https://t.co/GhIrTjDgWgCSA
@CSAsingapore
The official Twitter account of the Cyber Security Agency of Singapore 🇸🇬Christo Grozev
@christogrozev
Investigative journalist (Spiegel, The Insider, ex-Bellingcat), radio investor and hobby coder. Immediate blocks for whataboutism.Dmitri Alperovitch
@DAlperovitch
Geopolitics, NatSec, Great Power Competition, Cybersecurity. Chairman @SilveradoPolicy; Host @GeopolDecanted; Founder @alperovitch; Co-Founder @CrowdStrikeOSINTtechnical
@Osinttechnical
OSINT guy, PAI enjoyer, journalist @hntrbrkmedia, my views/freezing cold takes are my own. Standard spiel about not endorsing retweets, likes, and comments.kalmarunionen
@kalmarunionenDM
https://t.co/8NHWhF6mHU A collaboration of Danish CTF teams. Homepage: https://t.co/R1QLSkNBhi CTFtime Link: https://t.co/UZqSKg6yJ6TyphoonCon🌪️
@typhooncon
TyphoonCon is an annual all Offensive Security Conference, taking place May 27-31, 2024 in Seoul, South Korea. Tickets are now on sale! 🌪️Blackhoodie
@Blackhoodie_RE
Blackhoodie is a free, women-only reverse engineering workshop. Check our website for infos! #BHRESheHacks KE #SheHacks2024
@shehacks_ke
A community of women cyber warriors founded & led by women, looking to bridge the skills and gender gap in #InfoSec in Kenya. 👩🏻💻 📧[email protected]Interrupt Labs
@InterruptLabs
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.allthingsida
@allthingsida
All things IDA, security, reverse engineering, programming, AI and more. Friend and fan of Hex-Rays but non-official.REcon
@reconmtl
REcon: Annual reverse engineering and security conference held in Montreal.Elias Bachaalany
@0xeb
I love learning new things, writing and teaching.SmartFin
@SmartFin_VC
Investment fund investing in growing companies.d4nny
@edb88320h
Malware Analyst/Reverse EngineerGLIMPS
@GlimpsRe
Uncover your malwares in a GLIMPSe of an eye! Winner of the ECW2019 & 2020 Startup Trophy, @ecso_eu and @ACN_SecNum Certified !CODE BLUE
@codeblue_jp
International Security Conference in Tokyo HP https://t.co/blERauRf35 FB https://t.co/8aPoAB2ycl SL https://t.co/mAZs86Lr51 MV https://t.co/u0CjovYUdF@mikko
@mikko
Technology speaker and author. Chief Research Officer at WithSecure.Securelist
@Securelist
The resource for Kaspersky experts' technical research, analysis, and thoughts.Malware Unicorn
@malwareunicorn
Fuzzy Unicorn @ MSFT MORSE team. mastodon: https://t.co/XW6YndOe6rNiklas B
@_niklasb
research @dfsec_com - @[email protected]REhints
@REhints
sharing reverse engineering knowledgeKaspersky
@kaspersky
Kaspersky is the world’s largest privately held vendor of Internet security solutions for businesses and consumers. For support, visit https://t.co/enRPRUIwcmAzeria
@Fox0x01
Sneaky bit flipper | CEO of @azeria_labs | Arm Assembly Princess | Trainer | Author of @BlueFoxBook |Halvar Flake
@halvarflake
I do math. And was once asked by R. Morris Sr. : "For whom?" @[email protected] At the moment, for noone.Corellium
@CorelliumHQ
Mobile and IoT device virtualization on Arm. On-site and in the cloud. To sign up or learn more, visit us at https://t.co/2Sc3DIPzbXAlex Matrosov
@matrosov
🔬Founder & CEO @Binarly_io, #codeXplorer, #efiXplorer, @REhints and 'Rootkits and Bootkits' book. Previously worked at Nvidia, Cylance, Intel, ESET, Yandex.Dark Reading
@DarkReading
One of the most widely read and trusted cybersecurity news sites, providing IT security professionals informed insights into the latest news and trends.Threatpost
@threatpost
Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.Gartner
@Gartner_inc
We deliver actionable, objective insight that drives smarter decisions and stronger performance. Community guidelines: https://t.co/YoE73lYEBjForrester
@forrester
Forrester helps business and technology leaders use customer obsession to accelerate growth. With us, you can be bold at work.abhijit mohanta
@abhijit_mohanta
Author: 'Malware Analysis and Detection Engineering' and 'Preventing Ransomware' . Malware ResearcherAnoop Saldanha
@AnoopSaldanha
Author-Malware Analysis and Detection Engineering | Suricata IDS/IPS Core-Developer | Cybersecurity, IoT Security/Fingerprinting | Forensics | Open Source DevelPedram Amini
@pedramamini
CTO at @InQuest. Previously founded @theZDI. Investor, advisor, hacker. NYC born, Austin transplant. I tweet about infosec and general nerdery.Chris Eagle
@sk3wl
Igor Skochinsky (@[email protected])
@IgorSkochinsky
software developer at Hex-Rays*, hobby reverse engineer. Advanced cleartext hacker. 日本語おk *For Hex-Rays support/inquiries: https://t.co/rxVwo1npoQNicolas Brulez
@nicolasbrulez
Reverse Engineering Rockstar and Virus HEXorcist. CEO at #HEXorcist. Armadillo co-dev. 1st REcon trainer since 2005. Video Courses: https://t.co/YWsZN9U5LUIlfak Guilfanov
@ilfak
The author of IDA Pro and Hex-Rays Decompiler