Mariusz Mlynski is a security researcher from Poland who was awarded with $55,000 at HP's Pwn2Own 2014 hacking contest for exploiting Firefox wherein he was able to execute a fundamental flaw to escalate to system privileges in Windows.
Dan Rosenberg is a security researcher who is known for his kernel exploits. Together with Jon Oberheide, they demonstrated an exploit technique coined Stackjacking against a customized Linux kernel hardened with the grsecurity patchset. The attack was questionable since they used a modified kernel rather than a standard Grsecurity hardened kernel with a previously known exploit. He is also the author of FuzzDiff which is a tool that helps make crash analysis during file format fuzzing easier.
Jon Oberheide is the co-founder of of Duo Security. He completed his PhD at the University of Michigan in the realm of cloud security. He has presented at a wide range of academic, industry, and hacker security conferences (DEFCON, BlackHat, etc.). In a prior life, Jon enjoyed offensive security research and exploiting *nix. Together with Dan Rosenberg, they demonstrated an exploit technique coined Stackjacking against a customized Linux kernel hardened with the grsecurity patchset. The attack was questionable since they used a modified kernel rather than a standard Grsecurity hardened kernel with a previously known exploit.
Mario Heiderich is a self-proclaimed handsome heart-breaker but a skilled German security researcher (not to be messed with HTML5 Security). He leads a small pen-test company called Cure53 and works on projects such as the HTML5 Secruity Cheatsheet, DOMPurify, HTTPLeaks and others."
Ben Wilson who is known as g0tmi1k has contributed to, and started, various open source projects and tools. Constantly pursuing further knowledge and challenges, his interests and professional studies have led to his role with Offensive Security as a student instructor, lab administrator, Exploit Database administrator, and Kali Linux forum moderator.
Matt Edman is a former Tor developer that helped the FBI to hack and de-anonymize Tor users in several court cases, including the clamorous Operation Torpedo and Silk Road.
Brian Wallace a.k.a bwall / botnet_hunter is a software engineeer, security researcher, malware analyzer, and investigator of advanced threat actors. He acted as the leader and primary investigator for the Operation Cleaver investigation which resulted in the Operation Cleaver report coauthored with Stuart McClure.
He is also known as @WebBreacher in Twitter. He is an active member in the NoVAHackers community, writes Recon-ng modules, SANS Certified Instructor and enjoys tackling issues with the Python scripting language.
Sanoop Thomas is a moderator for Null Singapore chapter, and working as security consultant mainly involved with security assessment of web application, mobile, network, and servers. His area of interests lie in threat research, mobile security and automating pentest/analysis methodologies.
He co-authored the book "Secure Programming with Static Analysis" with colleague and Fortify founder, Brian Chess, in 2007. Today, the book remains one of the comprehensive guide to how developers can use static analysis to avoid the most prevalent and dangerous vulnerabilities in code.