Industry-Leading Online Penetration Testing Training and Certification for Information Security Professionals
The Offensive Security Team
Mati Aharoni “muts”
Lead Trainer & Developer
Mati (muts) is a network security professional, currently working with various Military and Government agencies. His day-to-day work involves vulnerability research, exploit development and whitebox / blackbox Penetration Testing. In addition, he is the lead trainer in the “Offensive Security” courses, which focuses on attacker tools and methodologies. Mati has been training security and hacking courses for over 14 years and is actively involved in the security arena, and is the core developer of the BackTrack and Kali Linux distributions.
Igor Frankovic “ronin”
Senior Director of Attack Simulation and Exploitation
Igor Frankovic (ronin) is a professional pentester with over 10 years of IT experience ranging from network and system administration to exploit research and development. Once he got the taste of the offensive side of information security, he earned the OSCP and OSCE certifications and never looked back. Igor spends his free time with his family, weaponizing new exploits, and putting his MMA opponents in their place.
Devon Kearns “dookie2000ca”
Technical Operations (edbbtmsfubughunterblogmaster)
Devon Kearns (dookie2000ca) is a former Communications Technician and IS Security Analyst with over 15 years of formal IT experience but his true passion lies in the field of information security, most notably in the realm of software exploitation and bug hunting. This fascination with vulnerabilities has led Devon to being the lead administrator of the Exploit Database and he is also a co-author and current lead maintainer of the free online Metasploit Unleashed training course.
Dr. Matteo Memelli “ryujin”
Research and Development
Matteo Memelli (ryujin) has been involved with systems administration, networking and information security for 12 years. Since his first experiences with security issues, he has been “hacked” by his passion for remote exploitation, vulnerability research and covert channels analysis. He became an Offsec addict when he took the online PWB course. Matteo went on to write the OSCE Certification along with muts. Now he is the core developer and trainer of our high end class “Advanced Windows Exploitation Techniques (AWE)”.
Jim O’Gorman “Elwood”
Jim O’Gorman (Elwood) is a professional penetration tester, an instructor at Offensive Security, and manages Offensive Security’s consulting services. Jim has lived online from the times of BBS’s, to FidoNet, to when SLIP connections were the new hotness. Jim spends time on both network intrusion simulation as well as digital investigations and malware analysis. When not working on various security issues, Jim spends his time assisting his children in their attempts to fight Zombie hordes.
Bosko Petrovic “bolexxx”
Lab Administrator (Wax Master)
Bosko Petrovic (bolexxx) is the Offensive Security Lab administrator. He has over 10 years of experience working with computers, networks and security. His current tasks with Offsec include building, testing and maintaining student labs. He also helps students with various lab and course related problems. Bosko is also an assistant in some of our live training courses.
Alexandru Uifalvi “sickness”
Administrator (revoked OS*)
Alexandru Uifalvi (sickness) has been passionate about networking, information security, vulnerability research, and especially exploit development from a very young age. Since his first successful exploit, passion for security changed into an obsession. Alex currently helps to build, maintain, and generally improve upon the Offensive Security labs. He also helps students that encounter lab and course issues.
Ben Wilson “g0tmi1k”
Ben Wilson (g0tmi1k) has always had a strong fascination with computers, particularly network security, for as long as he can remember. Over the years, he has contributed to, and started, various open source projects and tools. Constantly pursuing further knowledge and challenges, his interests and professional studies have led to his role with Offensive Security as a student instructor, lab administrator, Exploit Database administrator, and Kali Linux forum moderator.