Anant Shrivastava started with computer and open source software since 2000. He moderated linux user group of bhopal and was active across other major linux user groups across India. Anant now working as Regional Director Asia Pacific for NotSoSecure Global Service. He has been Speaker/Trainer at various conferences including BlackHat, RuxCon, Nullcon, C0c0n, Rootconf, Clubhack, G0s, etc. He is active in information security community null and OWASP. Now a days he is managing null bhopal which is primarily a student chapter, he is helping not just local members but is also actively involved with mentoring with projects like Offensive Web Test Framework (OWTF). He has contributed to reviewing and documenting various technical documents for Open Web Application Security Project (OWASP) such as Mobile Security Testing Guide, Mobile ASVS, Web Testing Guide. Since 2011 Anant actively manages the open source project AndroidTamer. Anant leads both Android Tamer and CodeVigilant projects.
Mike Hodges is a Senior Security Engineer at Red Ventures leading Red Team Operations and Incident Response. He comes from a background of application development and penetration testing consulting. Currently, his focus is on developing evasive offensive capabilities and fighting off the ever-present imposter syndrome brought on by working in InfoSec.
Fotis Chantzis has been a member of the core Nmap development team since 2009, when he wrote Ncrack under the mentorship of Fyodor, the original author of Nmap, during Google Summer of Code 2009 and 2010. He then worked as a mentor for the Nmap project during Google Summer of Code 2016 and 2017. He has also authored and published a video course on “Mastering Nmap”. His past research on network security includes exploiting the TCP Persist Timer (paper published on Phrack #66) and inventing a new stealthy port scanning technique by abusing the popular XMPP. His recent research focus has been on medical device & IoT security.
OJ Reeves is an Australian security professional who specializes in attack simulation. When not breaking networks and software, he is actively contributing to the Metasploit framework on Meterpreter for years. He is also a member of the Corelan team. Today OJ runs a specialist security consultancy called Beyond Binary based in Australia.
Ryan Dewhurst has been testing web applications professionally for security issues since 2009. He has a BSc (hons) Ethical Hacking for Computer Security that he completed with a First. Ryan is very active in the information security community, contributing to various OWASP projects and releasing his own popular tools such as Damn Vulnerable Web App (DVWA) and WPScan.
In 2013 Ryan was recognised by his peers when he was awarded the European Information Security Magazine Rising Star Award. Ryan has also appeared on the BBC and in many magazine and online publications for his work. In the past he has been known to identify security issues in companies such as Facebook, Apple and others while conducting independent security research. Currently Ryan runs his own consultancy business called Dewhurst Security, where he helps his clients with offensive web application security testing.
Simon is the project leader for the OWASP Zed Attack Proxy (ZAP), one of the world’s most popular free security tools, which he first released in 2010. Previously a Java web application developer he now works in the Mozilla Firefox Operations Security team helping to protect the core services that Mozilla relies on to build, ship and run Firefox.
Didier Stevens (Microsoft MVP, SANS ISC Handler, GSSP-C, GCIA, GCIH, GREM, Wireshark Certified Network Analyst, CISSP , MCSD .NET, MCSE/Security, MCITP Windows Server 2008, RHCT, CCNP Security, OSWP) is a Senior Analyst (NVISO https://www.nviso.be). Didier is a pioneer in malicious PDF document research and malicious MS Office documents analysis and has developed several tools to help with the analysis of malicious documents like PDF and MS Office files.
Didier is an active handler at https://isc.sans.edu. He also writes informative malware analysis contents on his personal blog http://blog.DidierStevens.com. You can also find his software http://blog.didierstevens.com/my-software and videos http://videos.DidierStevens.com
Michael Boelen has been actively contributing to opensource security tools over a decade with several tools including Rootkit Hunter and Lynis. Michael also actively maintaining LSE project with hundreds of opensource security tools.