exploit writer

Str0ke

IRL Name: 
Str0ke
Biography: 

Str0ke is the founder of Milw0rm exploit archive and a former member of the original milw0rm hacking group which became known for hacking into the Indian Bhabha Atomic Research Centre (BARC) in June 1998 and downloaded emails and classified documents about nuclear tests. News spread that he died last November 3, 2009 due to a heart condition but this is actually a hoax and that Offensive Security has been working with additional exploit addicts at maintaining the integrity of the Milw0rm exploit archive since Str0ke stopped updating the exploit archives he has been maintaining.

References

http://www.enigmagroup.org/forums/general-chatting/str0ke-founder-of-milworm-is-dead-(/

Carl-Fredrik Neikter

IRL Name: 
Carl-Fredrik Neikter
Biography: 

Carl-Fredrik Neikter is a Swedish programmer who wrote the infamous remote administration tool Netbus. He claimed that the Netbus program was meant to be used for pranks, not for illegally breaking into computer systems.

References

Craig Young

IRL Name: 
Craig Young
Biography: 

Craig Young is a bug hunter who has identified and responsibly disclosed dozens of vulnerabilities in products from Google, Amazon, IBM, NETGEAR, Adobe, HP, and others. His research has resulted in numerous CVE assignments and repeated recognition in the Google Application Security Hall of Fame. He won in track 0 and track 1 of the first ever SOHOpelessly Broken contest at DEF CON 22 by demonstrating 10 0-day flaws in SOHO wireless routers.

Pictures: 
References

eSDee

Biography: 

eSDee is an exploit developer from Netric. He has written remote exploits for Samba 2.2.x and prior that works against Linux (all distributions), FreeBSD (4.x, 5.x), NetBSD (1.x) and OpenBSD (2.x, 3.x and 3.2 non-executable stack).

References

indoushka

Biography: 

Has authored many php, ASP, SQLi etc... on web content managers & other pieces of code. Seems to find a lot of remote file inclusion vulns.

References

egyp7

IRL Name: 
James Lee
Biography: 

James Lee a.k.a egyp7 is a Metasploit Core Developer, security researcher and hacker. Before devoting all his time to Metasploit, he was a cyber security researcher for Idaho National Laboratory where he discovered numerous vulnerabilities in SCADA and Industrial Control Systems.

Pictures: 
References

Daniel Mende

IRL Name: 
Daniel Mende
Biography: 

Daniel Mende is a a German security researcher specialized in network protocols and technologies. He’s well known for his Layer2 extensions of the SPIKE and Sulley fuzzing frameworks and has presented on protocol security at many occasions including CCC Easterhegg, IT Underground/Prague and ShmooCon.

Pictures: 
References

Amjad Farooq Alvi

IRL Name: 
Amjad Farooq Alvi
Biography: 

Amjad Farooq Alvi along with his brother Basit Farooq Alvi created the Brain boot sector computer virus that was released in its first form in January 1986 and is considered to be the first computer virus for MS-DOS.

The virus came complete with the brothers' address and three phone numbers, and a message that told the user that their machine was infected and to call them for inoculation:

Welcome to the Dungeon © 1986 Brain & Amjads (pvt). BRAIN COMPUTER SERVICES 730 NIZAM BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE: 430791,443248,280530. Beware of this VIRUS.... Contact us for vaccination...

Pictures: 
References

Charles

Biography: 

Charles is a Chinese hacker who is one of the core members of the Network Crack Program Hacker (NCPH), a Chinese hacker group based out of Zigong in Sichuan Province - responsible for the development and deployment of exploit codes related vulnerabilities in Microsoft Word Malformed OLE Structure Code Execution and Microsoft Excel Malformed BIFF Structure Code Execution with over a period of 90 days during the summer of 2006.

Pictures: 
References

Adam Gowdiak

IRL Name: 
Adam Gowdiak
Biography: 

Adam Gowdiak is the CEO and Founder of Security Explorations, a company based in Poland that discovered a lot critical security hole in Oracle's Java SE software and developed a proof of concept exploit for it which permits complete Java security sandbox bypass. He received M.Sc. degree in Computer Science from the Poznan University of Technology. Prior to founding Security Explorations, he had been working for Poznan Supercomputing and Networking Center and Sun Microsystems Laboratories. For over 8 years, he had been also an active member of a Polish security research group called LSD.

He is a known Java Virtual Machine hacker, with over 50 security issues uncovered in the Java technology over the recent years.

Pictures: 
References
Syndicate content