Larry W. Cashdollar a.k.a lcashdol is an American vulnerability researcher and exploit coder who used to conduct penetration tests with SATAN & telnet. His security disclosures and exploits can be found at Packet Storm, Exploit-DB, vapid.dhs.org/exploits, etc.
Kingcope is a security researcher who gained fame for disclosing a lot of MySQL vulnerabilities on December 2012 which includes; MySQL 5.1/5.5 Windows Remote Exploit (mysqljackpot), MySQL (Linux) Stack Based Buffer Overrun PoC Zeroday, MySQL (Linux) Heap Based Overrun PoC Zeroday, MySQL (Linux) Database Privilege Elevation Zeroday Exploit, MySQL Remote Preauth User Enumeration Zeroday, and MySQL Windows Remote System Level Exploit (Stuxnet technique) 0day, and many more.
Chen Ing-Ha is from Taiwan who was responsible for creating the Chernobyl or Spacefiller, a Microsoft Windows computer virus and one of the most damaging computer viruses of all time. Although his virus is popularly dubbed as Chernobyl, the virus is known to experts as CIH and Mr Chen's colleagues say he had acknowledged using his own initials in naming the virus.
Clemens Kolbitsch is a currently working as a security researcher for Lastline INC and used to work as a security researcher too at Vienna University of Technology. And in the spring of 2011, he was a research intern at at Microsoft working with Ben Livshits and Ben Zorn and they were working on the detection of malicious websites on the Internet to filter Bing search results and thus protect its users. He finished his PhD studies at the International Secure Systems Lab. His main research interests are malware analysis and detection as well as virtualization. In previous projects, he was working on memory protection, race condition detection, and wireless communication and its security. He wrote cool white papers like: "Virtual 802.11 Fuzzing ", "Removing Web Spam Links from Search Engine Results ", "Effective and Efficient Malware Detection at the End Host", "The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code", etc.
Amit Malik is an independent security researcher and one of the core contributors of Security Xploded. His main areas of interest are Programming, Reverse engineering, Exploit Development, Malware analysis. He is currently working as a Security Researcher at McAfee Labs.
Not much is known about this guy but he was the one who coded wifite which is a mass WEP/WPA/WPA2 cracker or also known as an automated wireless attack tool. The new version of wifite supports "reaver", a Wifi-Protected Setup (WPS) attack tool.
Jean-Pierre Lesueur was born in 1990 in London and currently lives in France, Paris. He said that at age 15, he was already facinated by viruses and related malwares. He is a computer programmer who codes free softwares related to computer security (mostly in Delphi and C++) and web development. He is also a Pianist and music composer. Coded the DarkComer-RAT (Remote Administration Tool), Browser Forensic Tool, Mirage Anti-Bot, VertexNet Loader and other stuffs used by skiddies.
Simone started programming at a very young age and since studied many programming languages and mastering at least a dozen. Growing up, in addition to programming, he started to get interested in computer security, the open source movement and all those two elements were brought back in that period, when a 28K modem was the best technology and we wanted to load a page number minutes.
Sr. developer and security consultant from Italy, specializes in Unix derived systems such as GNU/Linux, *BSD, Mac OS X and on Microsoft platforms (95,98,2000,ME,XP,Vista,7,2003 Server) programming. Also develops some applications for embedded/mobile devices.
Keith Makan is a Computer Science and Physics Student from Cape Town,South Africa. A computer geek who is interested in hacking, Google dorks, Information Security and the Cyber War.
Wrote "Hacker Defender", a rootkit for Windows NT/XP/2000/2003, which he stopped working on in 2006.
During Hacker Defender's time, it was one of the preferred applications for showing windows "it's still vulnerable".