[EXCLUSIVE PROGRAMS] [BUG BOUNTY LIST ] [HACKTIVITY] | |
Account [RegistrationRole [Anonymous] Researcher: 40 Advisories: 80 Documents: 0 Videos: 0 Date: 23.07.2017 TZ: 20:32

Government Lab - Researchers, Team & Representatives

A listing of our public working members. Feel free to contact us ... new ideas, creative projects, events, audits/penetration tests, bug bounty programs or famous wargames/contests/challenges. The website is only a short review of some public government laboratory members in the internal core research team.

Public Vulnerability Research Team

Benjamin Kunz Mejri (32) is active as a penetration tester and security analyst for private and public security firms, hosting entities, banks, isp(telecom) and ips. His specialties are security checks(penetrationtests) on services, software, web applications, malware analysis, underground economy, government protection or reverse engineering, lectures, presentations and workshops about IT-security. During his work as a penetration tester and vulnerability researcher, many famous open- or closed source applications, software and services were formed more secure. In 1997, Benjamin K.M. founded a non-commercial and independent security research group called, "Global Evolution - Security Research Group".

In 2010 he founded the company "Evolution Security GmbH ". In 2007 the new Vulnerability Lab Program established as the transparent legal european initiative for vulnerability researchers, analysts, bug bounty hunters, penetration testers and serious hacker groups. Benjamin K.M. identified zero-day vulnerabilities in well known products from companies such as DELL, AT&T, Barracuda, Mozilla, Kaspersky, McAfee, Google, Oracle, Fortinet, Microsoft, Apple, PayPal, Skype, Facebook, United Airlines & SonicWall. He participated in multiple bug-bounty/research/developer programs, manage interviews (2) (3), solve important security jobs and joined to famous events/contests. In may 2012 Ben discovered 3 critical session vulnerabilities affecting 670 & 350 million user accounts of the skype, xbox live and msn hotmail account service. Ben provides also exclusive exploitation sessions & excellent security talks. Mejri is listed in wikipedia since the year 2016.

[ WWW ]
[ EMAIL ]
[ PGP ]

 

SaifAllah benMassaoud (23) is a student of maintenance technician in micro computer systems in Kelibia (Tunisia). SaifAllah has been works in the security field since 2009/2010 for various famous security companies. He is penetration tester with high experience in doing deeper exploitation and over 6 years of practical knowledge in the information security sector, He is also very talented on web-service hacking and security audits.

- Web Application Penetration Tests
- Vulnerability Assessment and Vulnerability Research
- Crypto-Analysis & Evasion

He joined The Government Laboratory Research Team in may 2016. SaifAllah discovered multiple vulnerabilities in US Government online service web-applications of manufacturers like the NASA, the US Department of Defense or European Commission. SaifAllah discovers as well bugs in famous product series of Microsoft, Skype, Google, Apple, Dell, Huawei, Adobe, Nokia, Blackberry, SAP, or Trend-Micro. SaifAllah scored in several public and private programs of the security scene during the year 2014 until 2016. He solved successful in 2016 an important interview with the famous TV News Sender in Tunis.

[ WWW ]
[ EMAIL ]
[ PGP ]

 

Mohamed Chamli (22) is a engineer student and a web application pentester and security researcher. He started his career with tunisian whitehat security team as a pentester. Chamli is trainer and represents new workshops about reverse-engineering and cryptography in arabish countries. He also work always in reverse engineering software and plays on many ctfs (capture the flag) with his team. He has a advanced experience in :

- Web-Application
- Crytpto Analyse & Steganography
- Reverse Engineering

He jouned the Government Laboratory Research Team in may 2016. He discovered serval vulnerabilities in many European Commission. Mohamed discovers also many bugs in Mozilla, Openclassrooms, Sourceforge, Blackberry, Bitdefender or Eset. Mohamed discovered serval bugs to private security programs as well and in a new member in the government laboratory. He is a developer and created the CyberCrowl security tool. Next to that he is also president of the Esprit CyberSec Club in Egypt.

[ WWW ]
[ EMAIL ]
[ PGP ]

 

[ Search ] [ News ] [ Submit ] [ Stats ] [ Team ] [ Partner ] [ Talks & Workshop ] [ Subscribe ] [ Customer ] [ Contact ] [ Impressum ]


[Statistics] [July] 0 Critical: 0 High: 0 Medium: 0 Low: 0 Best Researcher: [] Threat:

© EVOLUTION SECURITY GmbH ™