Alessandro Magnosi
Alessandro Magnosi is an accomplished Principal Cyber Security Consultant, boasting over a decade of expertise in the IT sector. He is currently a key member of the Security Testing Team at BSI, the United Kingdom's national standards body, known globally for its certification, training, and cybersecurity services. In addition to his primary role, Alessandro engages as an independent researcher and bug hunter for Synack RT. In his spare time, Alessandro is particularly active in developing and maintaining Open Source Software (OSS) projects, with a primary focus on offensive security.
Emeric
Nasi
I am a french cybersecurity researcher and the founder of BallisKit.
Passionate about all infosec subject, especially offensive security subjects, my main research interests mitigation bypass, malware writing, exploit weaponization.
I have been speaker at conferences (OffensiveCon, SisSegV, TyphoonCon). I also published some blog posts on various topics such as Antivirus Evasion, UAC bypasses, Initial Access, Linux and Windows security, etc.
At BallisKit, I am now focused on R&D for RedTeams and I am the author of MacroPack Pro and ShellcodePack.
Vincent Yiu
Vincent Yiu, a seasoned offensive cybersecurity consultant, has spent over a decade specializing in Red Team operations. His expertise has greatly enhanced the security of a diverse range of entities, from Fortune 500 companies and banks to fintech firms and critical infrastructures.
Vincent is at the helm of SYON Security, a firm renowned for its proficiency in advanced offensive security testing, Red Team, and Purple Team services. His strategic approach harmonizes business objectives with cybersecurity defenses, marked by comprehensive testing and introspective analyses.
Beyond shoring up technological defense lines, Vincent fosters a culture of cyber resilience within the organizations he serves. His dedication to navigating the dynamic landscape of cyber threats, combined with his proactive approach, positions Vincent as a valued contributor in the sector.
Panagiotis Chartas
Panagiotis Chartas (aka t3l3machus), is a Senior Penetration Tester & Cybersecurity Researcher, currently working at KMD, a leading IT and software company in Denmark. Apart from his primary role, he is an offensive security tools developer, renowned for his impactful contributions to the cybersecurity domain. His ingenuity is evident in the creation of widely-utilized tools such as the Villain C2 Framework (featured in Kali Linux's official repositories), HoaxShell (integrated with revshells.com), Toxssin, Psudohash, Eviltree, CVE-2023-22960, and more.
Pieter Ceelen
Pieter Ceelen a seasoned red teamer & security researcher. At Outflank, Pieter is involved in red teaming and the software development of Outflank Security Tooling, a broad arsenal of red team tools. Pieter performs research into offensive use of MS office and tries to locate new abuse mechanisms. He presented his work at various security conferences such as Troopers, Derbycon, Blackhat and Brucon
Vangelis Stykas
Vangelis began as a developer from Greece. Seven years ago he realized that only his dog didn’t have an API, so he decided to steer his focus towards security. That led him to pursue a PhD in Web Application Security with an extra focus on machine learning. He’s still actively pursuing it. He currently applies his skills as a Chief Technology Officer at Atropos, and during his free time, Vangelis is helping start-ups secure themselves on the internet and get a leg up in security terms. His love of a simplistic approach to hacking by exploiting vulnerable APIs led him to publish research regarding API controlling ships, smart locks, IP cameras, car alarms, EV chargers, and many other IoT devices. Since our lives are nowadays extremely cyber-dependent, his goal is to convince all companies to never neglect their API security as rush-to-market mentality is almost certain to lead to catastrophic security failure.
Efstratios Chatzoglou
Efstratios Chatzoglou received the M.Sc. degree in Security of Information and Communication Systems from
the University of the Aegean, Samos, Greece. He has worked more than 3 years in the field of cybersecurity.
Currently, he is a Penetration Tester with the Exelasis Ltd., Greece, and a PhD candidate at the University of
the Aegean. He has identified more than 25 different CVE IDs from well-known vendors, like ASUS, MediaTek,
Netgear, Huawei, LiteSpeed, etc. The most recent one is the CVE-2023-23349 from Kaspersky. He has
published more than 15 research papers in well-known conferences and academic journals.
Yashin Mehaboobe
Yashin Mehaboobe is a security consultant at Xebia and has more than 8 years experience in the embedded systems security domain.
His primary areas of interest is blackbox vulnerability analysis and pentesting of common IoT devices with focus on Internet facing scalable attacks. He's also identified several fault injection attacks in open source embedded software and modern microcontrollers. In his spare time he likes to travel, take photographs, bake and read.
Andrzej Dyjak
His cybersecurity career began over 15 years ago, transitioning from hacking to securing systems, which provided him with valuable insights from both an attacker's and a defender's perspectives. He currently manages a consulting and training company named Bezpieczny Kod, where he focuses on empowering teams with essential skills and advising on best practices for securing software across the Software Development Life Cycle (SDLC).
Additionally, he is an active content creator, building an open community around application security via Discord, running a YouTube channel and a podcast, and disseminating a weekly newsletter. He has also developed an online course titled "Offensive Testing of Web Applications" (OTWA) and is in the process of creating another course on the topic of DevSecOps. His efforts are dedicated to educating and fostering a space for IT professionals to exchange knowledge.
Konrad Jedrzejczyk
The first man who has ever publicly showcased an unmodified Commodore 64 as an attacking machine during modern penetration tests. An Information Security expert and conference speaker with a comprehensive background in Cyber Security (defense).
Co-creator of the AI project called ChatNMI
Marek Zmysłowski
He gained experience in both small companies and large corporations, such as Samsung, Trustwave and Microsoft, working as an engineer, pentester and manager. In the security industry for more than 14 years. Experience in the area of penetration testing, reverse engineering or vulnerability finding. Multiple conference speaker in Poland (Confidence, WTH) and abroad (HiTB, PacSec, DefCamp, H2HC, BlueHat)
Co-creator of the AI project called ChatNMI
Patroklos Argyroudis(argp)
He is a computer security researcher at CENSUS S.A. His main
expertise is vulnerability research, exploit development, reverse engineering and
source code auditing. Patroklos has presented his research at several international
security conferences (Black Hat USA, Black Hat EU, Infiltrate, CanSecWest, Chaos
Communication Congress, PH-Neutral, ZeroNights, etc.) on topics such as kernel and
heap exploitation, kernel protection technologies, and network security protocols. He
holds a PhD from Trinity College Dublin, where he has also worked as a postdoctoral
researcher on applied cryptography.
Zisis Sialveras
Zisis Sialveras, a computer security researcher from Greece, is currently employed at CENSUS
S.A. His professional portfolio encompasses a diverse array of tasks including vulnerability
research, reverse engineering, source code auditing, and exploit development. Previously, he
delved into experimenting with knowledge-based fuzzers and breaking hypervisors. However, his
recent endeavors have steered towards exploring the intricacies of browser security.
Chariton Karamitas
Chariton is an Android security researcher at CENSUS and a PhD candidate at the
Electrical Engineering department of the Aristotle University of Thessaloniki.
When not scrolling through cat memes, Chariton does math, reverse engineering
and exploit development.
Leonid Bezvershenko
Leonid joined Kaspersky in 2020 as an intern in the Global Research and Analysis Team (GReAT). In 2021, he was invited to the GReAT as a Junior Security Researcher.
In 2023, he was promoted to Security Researcher. In this role, Leonid focuses on open‑source security, reverse engineering, and malware analysis.
His research includes the analysis of APT campaigns, such as Operation Triangulation and CloudWizard. Additionally, he is actively involved in the development of internal tools and infrastructure. Leonid is currently a student at Moscow State University’s Faculty of Computational Mathematics and Cybernetics. He is also a captain of the Drovosec CTF team.