OJ Reeves is an Australian security professional who specializes in attack simulation. When not breaking networks and software, he is actively contributing to the Metasploit framework on Meterpreter for years. He is also a member of the Corelan team. Today OJ runs a specialist security consultancy called Beyond Binary based in Australia.
Ryan Dewhurst has been testing web applications professionally for security issues since 2009. He has a BSc (hons) Ethical Hacking for Computer Security that he completed with a First. Ryan is very active in the information security community, contributing to various OWASP projects and releasing his own popular tools such as Damn Vulnerable Web App (DVWA) and WPScan.
In 2013 Ryan was recognised by his peers when he was awarded the European Information Security Magazine Rising Star Award. Ryan has also appeared on the BBC and in many magazine and online publications for his work. In the past he has been known to identify security issues in companies such as Facebook, Apple and others while conducting independent security research. Currently Ryan runs his own consultancy business called Dewhurst Security, where he helps his clients with offensive web application security testing.
Simon is the project leader for the OWASP Zed Attack Proxy (ZAP), one of the world’s most popular free security tools, which he first released in 2010. Previously a Java web application developer he now works in the Mozilla Firefox Operations Security team helping to protect the core services that Mozilla relies on to build, ship and run Firefox.
Didier Stevens (Microsoft MVP, SANS ISC Handler, GSSP-C, GCIA, GCIH, GREM, Wireshark Certified Network Analyst, CISSP , MCSD .NET, MCSE/Security, MCITP Windows Server 2008, RHCT, CCNP Security, OSWP) is a Senior Analyst (NVISO https://www.nviso.be). Didier is a pioneer in malicious PDF document research and malicious MS Office documents analysis and has developed several tools to help with the analysis of malicious documents like PDF and MS Office files.
Didier is an active handler at https://isc.sans.edu. He also writes informative malware analysis contents on his personal blog http://blog.DidierStevens.com. You can also find his software http://blog.didierstevens.com/my-software and videos http://videos.DidierStevens.com
Michael Boelen has been actively contributing to opensource security tools over a decade with several tools including Rootkit Hunter and Lynis. Michael also actively maintaining LSE project with hundreds of opensource security tools.