Researchers

People doing notable work in offensive security, by area. Maintained as the wiki ingests their writing.

Status: seed Related: Reading List, Vulnerability Research


Windows kernel exploitation

ResearcherAffiliationAreas
Alex Ionescu(CrowdStrike, formerly)Windows internals, CLFS reverse engineering, kernel architecture. Windows Internals co-author.
Connor McGarrn/aKernel exploitation tutorials; CET / shadow stack research. https://connormcgarr.github.io/
Saar Amar(Microsoft)Windows mitigations, browser exploitation, JS engines. https://saaramar.github.io/
Yarden Shafirn/aWindows internals, EDR evasion, kernel architecture.
Boris LarinKaspersky GReATIn-the-wild Windows LPEs (CLFS series, etc.).
Cherie-Anne LeeStarLabscldflt.sys, CimFS, kernel pool exploitation.
Grant Willcox(Trend ZDI / Immersive Labs)Windows kernel CVE write-ups.
Filip Dragovićn/aWindows logic bugs, redirection-based escalation.
carrot_c4k3n/aPwn2Own 2024 — Windows LPE chain via CVE-2024-30088 (NT-kernel TOCTOU + IORING).
Frontier Squad (Theori)Theoriafd.sys exploitation; CVE-2023-28218 Hexacon 2023.
Akamai security researchAkamaiPatchDiff-AI; root-cause analysis pipelines; CVE-2025-60719 afd.sys UAF write-up.
Alessandro Iandoli (MrAle98)n/aHyper-V exploitation; CVE-2025-21333 PoC introducing single-entry IORING corruption.
Luis CasvellaQuarkslabBYOVD research; CVE-2025-8061 Lenovo LnvMSRIO.sys.

Red-team tradecraft / Cobalt Strike / EDR evasion

ResearcherAffiliationAreas
Marc SmeetsOutflank / FortraCo-founder; RedELK; OST direction; year-end retrospectives; AD-lab automation. Outflank catalogue.
Pieter CeelenOutflankOffice maldoc tradecraft; AMSI for VBA; macro-detection (defender side).
Stan HegtOutflankOffice maldoc tradecraft (XLM, SYLK, Visual Studio); HTML smuggling explainer; Evil Clippy.
Cornelis de PlaaOutflankDirect syscalls + sRDI; AD recon via ADSI; Direct Syscalls in BOFs; advanced process monitoring.
Mark BergmanOutflankCobalt Strike External C2; DoH C2; mail-handler exploitation.
Cedric Van BockhavenOutflankSecure enclaves for offensive ops; GrimResource (MSC); BOF linting; Superfetch internals; named-pipe enumeration.
Dima van de WouwOutflankEarly Cascade Injection; EDR Unhooking; VSTO-signed phishing; Async BOFs.
Kyle AveryOutflankEDR internals (macOS / Linux); Unmanaged .NET patching; seccomp-notify Linux injection; macOS JIT; LLM-assisted offensive R&D.
Mariusz BanachOutflank (joined 2026)Red Macros Factory; modern Office macro tradecraft.
Daniel Duggan (“RastaMouse”)Zero-Point Security / Fortra (joined 2026)Offensive-security training (CRTO / CRTL).
Ksawery CzapczyńskiOutflankWindows kernel tradecraft (PatchGuard Peekaboo).

Linux kernel exploitation

ResearcherAffiliationAreas
Brian PakTheori / Xint CodeLinux kernel VR; AI-assisted vulnerability discovery (Xint Code scanner). CVE-2026-31431 “Copy Fail” co-discoverer.
Taeyang LeeTheori / Xint CodeLinux kernel crypto subsystem; identified AF_ALG + splice as a page-cache exposure vector that surfaced CVE-2026-31431.

Browser / JS engine exploitation

ResearcherAreas
Samuel GroßV8 (Chrome) — typer bugs, JIT confusion. Project Zero.
Sergei GlazunovChrome / V8 type confusion. Project Zero.
Amy BurnettBrowser exploitation tutorials, V8 internals.
Manfred PaulJavaScript engine research; Pwn2Own competitor.
Jeremy FetiveauSafari / WebKit.
360 Vulcan, Qihoo Vulcan, DBAPP Security alumniBrowser pwn at Pwn2Own / Tianfu Cup.

Active Directory / red team / identity

ResearcherAffiliationAreas
Will Schroeder (“harmj0y”)SpecterOpsADCS, Kerberos, lateral movement; Certified Pre-Owned.
Lee ChristensenSpecterOpsADCS; Certified Pre-Owned co-author.
Benjamin Delpyn/amimikatz; Kerberos abuse.
Dirk-jan MollemaOutsider SecurityEntra ID / hybrid identity; ROADtools.
Adam Chester (“xpn”)TrustedSecToken / Kerberos / EDR-evasion writeups.
Andy RobbinsSpecterOpsBloodHound co-creator; AzureHound.
Daniel HeinsenSpecterOpsBloodHound; ADCS attacks.

Web / application security

ResearcherAreas
James KettleWeb protocol attacks (HTTP request smuggling, web cache deception). PortSwigger.
Orange TsaiSSRF, web protocol abuse, Exchange ProxyShell.
Sam CurryBug bounty hunter; auth/auth and identity bugs.
Frans RosénDetectify; logic and identity bugs.
Brett BuerhausWeb app + auth/auth deep dives.

Vulnerability research / fuzzing

ResearcherAreas
Tavis OrmandyProject Zero. Cross-domain VR.
Natalie SilvanovichProject Zero. Messaging apps, video conferencing, attack surface reduction.
Mateusz Jurczyk (“j00ru”)Windows kernel, font fuzzing, exploit dev.
Ned WilliamsonProject Zero. Browser sandbox escapes.
Ben HawkesFormerly Project Zero lead; founded Isosceles.
Andy Nguyen (“theflow0”)Game console, IoT, Linux kernel exploitation.
ChompieBug hunter; Pwn2Own; SIGRed.
Sagi TzadikMicrosoft; SIGRed (CVE-2020-1350).

Hardware / firmware / embedded

ResearcherAreas
Christopher Domasx86 microarchitecture, processor backdoors, novel ISA tricks.
Joe GrandHardware reverse engineering.
Trammell HudsonFirmware (UEFI), bootkit research.
Travis GoodspeedEmbedded / RF / smart-card.

Cryptography

ResearcherAreas
Daniel J. Bernstein (djb)Cryptographic primitives, post-quantum.
Tanja LangePost-quantum cryptography.
Filippo ValsordaPractical applied crypto; Go crypto/x509.
Matthew GreenCrypto policy + applied crypto research.
Joan DaemenAES / Keccak / SHA-3 co-designer.

Wi-Fi / wireless protocols

ResearcherAffiliationAreas
Mathy VanhoefNYU Abu Dhabi / KU LeuvenKRACK, Dragonblood, FragAttacks, Framing Frames, TunnelCrack, SSID Confusion, PEAP/IWD bypass, AirSnitch — sustained body of Wi-Fi protocol VR.
Frank PiessensKU LeuvenKRACK co-author (CCS 2017); systems security generally.
Eyal RonenTel Aviv UniversityDragonblood co-author; cryptographic protocol attacks.
Domien SchepersNortheasternFraming Frames / MacStealer (USENIX’23); MFP deauthentication (WiSec’22).
Aanjhan RanganathanNortheasternWireless security; co-author on Framing Frames + MFP deauth work.
Héloïse GollierKU LeuvenSSID Confusion (WiSec’24 best paper).
Christina Pöpper, Nian Xue, Yashaswi Malla, Zihang XiaNYU Abu DhabiTunnelCrack (USENIX’23) — VPN routing-table attacks.
Dominique Bongard0xcite (CH)Pixie Dust — offline WPS PIN recovery (Hack.lu 2014).
Mengyuan Zhou, Ang Pu, Yuxuan Liu, Feng Qian, Yuanjie TanUC Riverside / KU LeuvenAirSnitch (NDSS’26) co-authors.
Srikanth V. KrishnamurthyUC RiversideWireless / network security; AirSnitch co-author.

Ingest discipline

When you ingest a source by one of these researchers, add a row to this page if missing, and add the source to their entry. Over time this becomes the wiki’s who-knows-what index.