Skip to content
View bradlarsen's full-sized avatar

Highlights

  • Pro

Block or report bradlarsen

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
bradlarsen/README.md

Brad Larsen

Mastodon Link website

I’m a computer scientist in Massachusetts with graduate education who has worked in industry for 13 years. I’ve worked on static program analysis, symbolic execution, compilers and interpreters, fuzz testing, application security, and production machine learning systems.

I currently work in a team at Praetorian that combines static analysis with machine learning to augment the capabilities of offensive security operators.

You can find my resume here. I’ve also written and presented several peer-reviewed publications over the years.

You can find me on the infosec.exchange Mastadon instance as @bradlarsen.

Open Source

Nearly all my professional work has been in closed-source proprietary codebases. But some has been open-source, including these things:

Pinned Loading

  1. praetorian-inc/noseyparker praetorian-inc/noseyparker Public

    Nosey Parker is a command-line program that finds secrets and sensitive information in textual data and Git history.

    Rust 1.7k 80

  2. trailofbits/manticore trailofbits/manticore Public

    Symbolic execution tool

    Python 3.7k 472