Mati Aharoni “muts”
Lead Trainer & Developer
Mati (muts) is a network security professional, currently working with various Military and Government agencies. His day-to-day work involves vulnerability research, exploit development and whitebox / blackbox Penetration Testing. In addition, he is the lead trainer in the “Offensive Security” courses, which focuses on attacker tools and methodologies. Mati has been training security and hacking courses for over 14 years and is actively involved in the security arena, and is the core developer of the BackTrack and Kali Linux distributions.
Ruben Boonen “b33f”
Ruben Boonen (b33f), is a Philosopher by day and a hacker by night. His main areas of interest include Windows exploit development, privilege escalation, and post-exploitation. After coming into contact with Offensive Security, he was instantly hooked and proudly holds the OSWP, OSCP, and OSCE certifications. His tasks include helping students with various course related issues, Exploit Database administration, and research and development.
Igor Frankovic “ronin”
Senior Director of Attack Simulation and Exploitation
Igor Frankovic (ronin) is a professional pentester with over 10 years of IT experience ranging from network and system administration to exploit research and development. Once he got the taste of the offensive side of information security, he earned the OSCP and OSCE certifications and never looked back. Igor spends his free time with his family, weaponizing new exploits, and putting his MMA opponents in their place.
Paul Hand “rAWjAW”
Student Administrator (wiki guru)
Paul Hand (rAWjAW) is an Offensive Security instructor and has recently earned a Masters degree in Information Assurance. Paul works on various projects including the free online Metasploit Unleashed course, Exploit-DB, and the BackTrack Wiki. Paul also has a passion for problem solving and critical thinking.
Alain Hernandez “ipchain”
Alain Hernandez (ipchain) is a security engineer with over 10 years of experience. His passion for security, vulnerability research, and exploit development has quickly turned into an obsession. Alain is a life-long learner currently tasked with student support, lab development, maintenance, and administration.
Devon Kearns “dookie2000ca”
Technical Operations (edbbtmsfubughunterblogmaster)
Devon Kearns (dookie2000ca) is a former Communications Technician and IS Security Analyst with over 15 years of formal IT experience but his true passion lies in the field of information security, most notably in the realm of software exploitation and bug hunting. This fascination with vulnerabilities has led Devon to being the lead administrator of the Exploit Database and he is also a co-author and current lead maintainer of the free online Metasploit Unleashed training course.
Steven McElrea “loneferret”
Steven McElrea (loneferret) has been working in IT professionally since 2005 mostly as a Windows and Exchange Administrator. His curiosity for information security became a full-time hobby when he was first exposed to PWB and has been a part of the Exploit Database administration team since 2009. A proud OSCP and OSCE, he is currently tasked with lab development and administration along with student support.
Dr. Matteo Memelli “ryujin”
Matteo Memelli (ryujin) has been involved with systems administration, networking and information security for 12 years. Since his first experiences with security issues, he has been “hacked” by his passion for remote exploitation, vulnerability research and covert channels analysis. He became an Offsec addict when he took the online PWB course. Matteo went on to write the OSCE Certification along with muts. Now he is the core developer and trainer of our high end class “Advanced Windows Exploitation Techniques (AWE)”.
Jim O’Gorman “Elwood”
Jim O’Gorman (Elwood) is a professional penetration tester, an instructor at Offensive Security, and manages Offensive Security’s consulting services. Jim has lived online from the times of BBS’s, to FidoNet, to when SLIP connections were the new hotness. Jim spends time on both network intrusion simulation as well as digital investigations and malware analysis. When not working on various security issues, Jim spends his time assisting his children in their attempts to fight Zombie hordes.
Bosko Petrovic “bolexxx”
Lab Administrator (Wax Master)
Bosko Petrovic (bolexxx) is the Offensive Security Lab administrator. He has over 10 years of experience working with computers, networks and security. His current tasks with Offsec include building, testing and maintaining student labs. He also helps students with various lab and course related problems. Bosko is also an assistant in some of our live training courses.
Alexandru Uifalvi “sickness”
Administrator (revoked OS*)
Alexandru Uifalvi (sickness) has been passionate about networking, information security, vulnerability research, and especially exploit development from a very young age. Since his first successful exploit, passion for security changed into an obsession. Alex currently helps to build, maintain, and generally improve upon the Offensive Security labs. He also helps students that encounter lab and course issues.
Ben Wilson “g0tmi1k”
Ben Wilson (g0tmi1k) has always had a strong fascination with computers, particularly network security, for as long as he can remember. Over the years, he has contributed to, and started, various open source projects and tools. Constantly pursuing further knowledge and challenges, his interests and professional studies have led to his role with Offensive Security as a student instructor, lab administrator, Exploit Database administrator, and Kali Linux forum moderator.