The Microsoft Security Response Center (MSRC) is pleased to recognize the security researchers who have helped make Microsoft online services safer by finding and reporting security vulnerabilities. Each name listed represents an individual or company who has privately disclosed one or more security vulnerabilities in our online services and worked with us to remediate the issue.

For the current month's acknowledgments, visit the acknowledgments home page.

Please note: links are temporarily disabled.

July 2018 Security Researchers

  • Abhishek Kar 
  • Adesh Nandkishor Kolte 
  • Ahmed Jerbi 
  • Ajay Kulal of Dr. Homi Bhabha Vidyalaya, Tarapur 
  • Anand A S 
  • Ankit Singh 
  • Anushree A Vaidya 
  • Arvind Mudaliyar (Security Researcher) 
  • Ashar Javed of Hyundai AutoEver Europe GmbH 
  • Ashwin Kumar .A 
  • Bhavesh Varotaria of Krydence Technologies 
  • Bishal Shrestha(विशाल श्रेष्ठ) 
  • Bogdan Calin 
  • Brian Nigl of Convergency LLC 
  • Cameron Vincent 
  • Carlos Perez Gonzalez of IHackLabs 
  • Chirag Gupta 
  • Dan Niño I. Fabro of University of Science and Technology of Southern Philippines 
  • Darshit Varotaria of Krydence Technologies 
  • Dorian Lecoeur 
  • Vivek Gurung 
  • Ethan Wright 
  • Fabio Pires (blog.fabiopires.pt) 
  • Francesco Mifsud (http://vulnerable.space) 
  • Gerard Arall from Endouble 
  • Hariharan.S 
  • Hoang Quoc Thinh (@g4mm4) of Cyber Jutsu Co.,Ltd 
  • İlyas ORAK(@ilyasorak_) of Innoverabt 
  • llt4l 
  • Jafar Hasan of Webvillee Technology Pvt. Ltd 
  • Jaime Ivan Mendoza Ribera 
  • James Davis of Virginia Tech 
  • JAYATEERTHA G 
  • Jens Müller of Ruhr-University Bochum 
  • Joel Melegrito 
  • Julien Zolli 
  • Kenneth Billones 
  • Konark Modi (@konarkmodi) at Tech Lead - Cliqz, Gmbh 
  • Krishna Manoj Vandavasi 
  • Muhammad Uwais 
  • Leonid Hartmann @_harleo 
  • Luca Consolati 
  • Luigi Gubello 
  • Taha Ahmed Siddiqui 
  • Maurice Funke 
  • MIDHUN S (Bug hunter) 
  • moustafa dabbous 
  • Murat Kaya (mksecurity) 
  • Nethanel Gelernter of Cyberpion 
  • Ömer Ali Şentürk from Antalya Bilim University 
  • Paresh Parmar 
  • Pethuraj M 
  • Parvez Alam ( Pflash Punk ) 
  • Prasanna Dash 
  • Rachit Verma (@B43kd00r) 
  • Richard Shupak 
  • Robert Wiggins of Revolution Four 
  • Rony Gigi 
  • Sadik Shaikh of Extreme Hacking 
  • Sahad NK 
  • Samet ŞAHİN 
  • Sanjay Singh Jhala of ProSirius Technologies 
  • Amandeep Singh Chawla 
  • Sean Bourke 
  • Sébastien Kaul 
  • Shay Priel of Cyberint 
  • Shivasurya S 
  • SI9INT 
  • Sreenath Raghunath 
  • Suresh C 
  • Vartul Goyal 
  • Vignesh.V of SRM Institute of Science & Technology 
  • Vishakh B 
  • Yakup (korpithe@gmail.com) 
  • Yan JIA - National Computer Network Intrusion Protection Center (NCNIPC), University of Chinese Academy of Sciences (UCAS) School of Cyber Engineering, Xidian University 
  • Yarin Rehtan from Cyberint 
  • Zhong Zhaochen of @asnine

June 2018 Security Researchers

  • Aam Chandra
  • Aamir Rehman Yousafzai
  • Adesh Nandkishor Kolte
  • Ahmed Jerbi
  • Alex Birsan
  • Ali Tütüncü
  • Amal Mohandas
  • Anas Mahmood
  • Anurag Jain(@csanuragjain)
  • Arun Babu
  • Arzel Rodriguez
  • Ashar Javed of Hyundai AutoEver Europe GmbH
  • Cameron Dawe of Spam404
  • Cameron Vincent
  • Cameron VincentIndividual
  • Carl Pearson
  • Cem Onat Karagun of Kocaeli University
  • Charles Worrell
  • Deepak k
  • Diogo Real
  • Nicky of Tencent Blade Team
  • Emad Shanab
  • Evgeniy Yakovchuk
  • Fabio Pires (https://blog.fabiopires.pt)
  • Farzan Karimid of Electronic Arts
  • Florian Gattermeier and Heinrich Wiederkehr of ERNW GmbH
  • Francesco Mifsud (http://vulnerable.space)
  • Frank B. Vickers
  • Hafsa Mirza
  • Hamza BACHIKH
  • Hamza Bettache
  • Hanno Böck
  • Hariharan.S
  • Hashir Hussain
  • Data Theorem, Inc.
  • HyperChem Ma of Tencent's XuanWu Lab
  • İlyas ORAK ( www.e-hacker.org )
  • İsmail Şentürk
  • Jaikishan Tulswani (_iamjk)
  • James Guerin of Digital Pharos Inc.
  • Jason Hill of CyberInt
  • Jonathan Birch of Microsoft
  • Juba Baghdad
  • Kamil Sevi
  • Lakshay Gupta
  • Manish Bhatttacharya of SynapseFi
  • Mario Gomes (@NetFuzzer)
  • Michael Eissele
  • Mohd Maroof at Pristine infosolutions
  • Muhammad Muhaddis
  • Ning Guo
  • Nitin Devdas Bangera
  • Pratik Vinod Yadav from Lokmanya Tilak College of Engineering (LTCOE)
  • Rasheed T
  • Rahul Kshirsagar
  • Ravinder Verma
  • Richard Shupak
  • Ronni Skansing
  • Rony Gigi
  • Agametov Rustam
  • Sahil Mehra
  • Saleh Shaban
  • Sean Gambles
  • Shay Priel of Cyberint
  • Shubham Pathak
  • Soroush Dalili of NCC Group
  • Sriharsha P
  • Stefan Kanthak
  • Stefan Scherer
  • Cedric Cochin of McAfee’s Advanced Threat Research (ATR) Team
  • Sudhanshu Rajbhar(Sudi)
  • Suresh C
  • Terry Zhang at Tophant
  • Thalaivar Subu
  • Titus Koopal
  • Victor Yun of Nepean HS (Victor Yun)
  • Yarin Rehtan of Cyberint
  • Yougharta Ghennai of Souk Naamane Sec Team

May 2018 Security Researchers

  • Adesh Nandkishor Kolte
  • Aditya Jadhav at Secure Cyber Future
  • Ahmed Jerbi
  • Ajay Kulal
  • Akhilesh Attri
  • Akram Lagrazna of HighSecure
  • Alec Blance
  • Ali Wamim Khan
  • Alperen Keskin
  • Amal Mohandas
  • Aman Mahendra
  • Amirhossein Shahin
  • Amsal Khan (amsalkhan)
  • Ana Maria Popescu @amiutza (Twitter)
  • Anam Siddiqi and Shwetabh Suman (@SHWETABHSUMAN11)
  • Anas Roubi
  • Anggi Gunawan at bugbounty-hunter.blogspot.com
  • Anil Tom
  • Ankit Joshi at Pristine infosolutions
  • Anshul lahoti
  • Ashar Javed of Hyundai AutoEver Europe GmbH
  • Avinash. R
  • Aziz Kamal
  • Barrett Adams
  • @Bhadresh Patel
  • Cameron Dawe of Spam404
  • Cameron Vincent
  • Chacko K Abraham
  • Chinmay Patel
  • Chirag Gupta
  • Dadou Bendjedidi
  • Daniel Maksimovic
  • Deepak Rathore
  • DIPAK D. PRAJAPATI
  • Diwakar Kumar
  • Elyesa in der Maur of elyesa.nl
  • Hamza Bettache
  • Harsh Mukeshbhai Joshi
  • Hoang Quoc Thinh (@g4mm4) of Cyber Jutsu Co.,Ltd
  • Huynh Phuoc Hung
  • Ismail Tasdelen
  • Jaakko Lehtinen
  • Jayateertha G
  • Jayson Vasquez Rubio at Iloilo Science and Technology University (ISAT-U)
  • Júlio Soares at Infosec Security
  • Kdiag Haci
  • Kenan Can
  • Kushagra Pathak
  • Lasse Trolle Borup of Langkjaer Cyber Defence
  • ak1t4
  • Lukka Pranay of India
  • Manish Kumar Gupta of Lethal Leet
  • Martijn Vernooij of TNO
  • Mayuresh Satao of HackersEra
  • Meridian Miftari
  • Mohamed Hamed
  • Nick Kelley
  • Nicodemo Gawronski @nijagaw
  • Niraj Gautam
  • Nisheal A John of @nishujohn, India
  • Oscar Tebar Serrano
  • Pethuraj M
  • Prakhar Agnihotri Security Researcher at Times Internet, Ltd.
  • Pramod Mali
  • Prathamesh Joshi
  • Pratik Luhana
  • Praveen Kumar Balasundaram of Starlin-Trusted Security Advisor
  • Pritesh Narendrabhai Mistry
  • Priyanshu Sahay at HackersOnlineClub
  • Pubudu Priyashan Iddamalgoad
  • Qusai Ali Alhaddad
  • Rafael Hernandez
  • Rakesh Sharma (w00t_r00t)
  • Ravinder Verma
  • Rhishikesh M V
  • Richard Shupak
  • Robert Raaijmakers
  • Safwat Refaat
  • Sagar Gharbudve
  • Sagar V
  • Sedat Özdemir
  • Shubahm Yernale of Hackersera
  • Sourav Newatia
  • Sreedeep.Ck Alavil at Kerala Police Cyber Dome Volunteers Commander
  • Steven Hampton
  • Steven Thompson
  • Suresh C
  • Sushant Kishor Kumawat of Tibco Software India
  • Taha Smily
  • Tansel ÇETİN
  • Thrivikram Gujarathi
  • Tibin Sunny
  • U Kiran vas Reddy
  • Vasim Shaikh
  • Vikas Upadhyay from Meerut institute of Engineering and Technology, INDIA
  • Vinay Bhatia of @Wipro
  • Vipul Dwivedi
  • Virendra Singh of Pristine Infosolutions Pvt LTD.
  • Vishal Singh
  • Vishnu Prasad P G
  • Youssef Abyaa

April 2018 Security Researchers

  • Adrian Ivascu
  • Ahmed Jerbi
  • Ajay Kulal
  • Alexander Sidukov
  • Ali Tütüncü
  • Amal Mohandas
  • Aman Mahendra
  • Anees Khan
  • Ankit Singh
  • Ashar Javed of Hyundai AutoEver Europe GmbH
  • Athul Jayaram @athuljayaram
  • Brian Howson
  • Cameron Vincent
  • Carl Pearson
  • Chinmay Patel
  • Corben Leo
  • Dan Niño I. Fabro of University of Science and Technology of Southern Philippines
  • Daniel Bastos
  • Darshan Soni
  • Denis Szadkowski
  • Dino Covotsos of Telspace Systems
  • Gineesh George
  • Glevita Mendonsa
  • கோபிநாத்(Gopinath) - மதுரை(Madurai)
  • Hanno Böck
  • İlyas ORAK(@ilyasorak_) of UITSEC
  • llt4l
  • Ismail Tasdelen
  • Jayateertha G @JayateerthaG
  • Jens Müller of Ruhr-University Bochum
  • Kamil Sevi
  • Sardarescu Louis Aurel
  • Luigi Gubello
  • Matthew Telfer
  • Mitesh Patil
  • Mohammed Israil
  • Mohd Haji
  • Mustafa Hasan strukt
  • AssetWatch.io
  • S.Naveen Kumar at Mazenet
  • Pethuraj M
  • Prasad Lingamaiah
  • Richard Shupak
  • Rohan Das
  • Rounak Dhadiwal
  • Sam Eizad
  • Shailesh Suthar
  • Shubham Maheshwari
  • Shuo Chen
  • Siva Krishna Samireddi
  • Stefan Kanthak
  • Suresh C
  • Sureshbabu Narvaneni
  • Taha Smily
  • Tansel Çetin
  • Tarun Gupta (tgupta80) of IBM Security, Singapore
  • Tejas Jain
  • Tejpratap Singh
  • Tobias Rønn Møller
  • Vijay Kannan of TwinTech Solutions
  • Vikash Chaudhary CEO and Founder at Hackersera Cyber Security Consultancy and Training PVT LTD
  • Vishal Singh
  • Yassine Nafiai
  • Youssef Abyaa
  • S M Zia Ur Rashid (https://ziaurrashid.com) of International Islamic University Chittagong, Bangladesh

March 2018 Security Researchers

  • Abdel Hafid Ait Chikh
  • Abdelfattah ibrahim
  • Abhilash Raj
  • Adi Ivascu
  • Ahmed Adel Abdelfattah
  • Akash Pawar at Deogiri Institute of Engineering and Management Studies, Aurangabad
  • Alec Blance
  • Ali Hassan Ghori | @alihasanghauri of Danalweb
  • Ana Maria Popescu @amiutza (Twitter)
  • Ankit Singh
  • Ankit Singh CEO & Director at Adideva Technologies
  • Ashar Javed of Hyundai AutoEver Europe GmbH
  • Asif Balasinor
  • Bartłomiej Bergier
  • Bhavesh Varotaria of Krydence Technologies LLP
  • Bijan Murmu
  • Bishal Shrestha (विशाल श्रेष्ठ)
  • Bryan Prendergast of Federal Home Loan Bank of Chicago
  • Cameron Vincent
  • Casey Smith
  • Christos Karras
  • Daniel Le Souef
  • Daniel Rękawek of Vensis
  • Darshit Varotaria of Krydence Technologies LLP
  • Dawood Ansar
  • P. Dhamotharan
  • Dharmesh Baskaran
  • Flavio Baldassi of Horizon Security
  • Frans Rosén of Detectify
  • Hari Prasad T
  • Harry M. Gertos
  • Heeraj of Team bi0s
  • Herane Malhotra
  • Huynh Phuoc Hung
  • Hussein Ahmed Albree at Aman Technology Company
  • Ipsita Subhadarshan Sahoo (ipsalonzo)
  • llt4l
  • Ismail Tasdelen
  • Joel Melegrito at Pinoy White Hat
  • Johan Haak
  • Veramine, Inc
  • Jovon Itwaru
  • Kamil Sevi
  • Kenneth Billones
  • Kirtikumar Anandrao Ramchandani
  • Knoq
  • Krishna Raja of MicroGenesis TechSoft Pvt. Ltd,Bangalore
  • Louis Dion-Marcil
  • Love Sharma at Pristine InfoSolutions Pvt. Ltd.
  • Mario Gomes (@NetFuzzer)
  • Max Smith
  • @Mhamed kchikech
  • Michail Bolshov BigBear
  • Mohammad Naveed S
  • Mohammed Israil
  • Nethanel Gelernter of Cyberpion
  • Nicodemo Gawronski @nijagaw
  • Nikhil Sahoo (nikhil.sahoo.1232)
  • Praful Pradeep Kumar Bhandari at Graphic Era Deemed To Be University
  • Pranjal Singhal
  • Prasad Lingamaiah
  • Pratik Karia
  • Preetisagar Parida
  • Muhammad Qasim Munir
  • Raja Uzair Abdullah
  • Ramzes600
  • Raviraj Shedage
  • Richard Horn
  • Richard Shupak
  • Rihana Shaikh at Extreme Hacking
  • Rounak Dhadiwal
  • Sadik Shaikh at Extreme Hacking
  • Sahil Mehra
  • Sai Shanthan Palvai
  • Sam Eizad at Certezza
  • Samir Hadji
  • Saran Vanaja of Prathyusha Engineering College
  • Shaikh Yaser Arafat
  • Shay Priel of Cyberint
  • Shiv Sahni (@shiv__sahni)
  • Shubham Maheshwari
  • Somil Jain
  • Steve Syfuhs
  • Sujatha Yakasiri
  • Suresh C
  • Thrivikram Gujarathi
  • Vignesh.V and Praveen. K.C at SRM Institute of Science and Technology
  • Vishal Singh
  • Voleti Sai Roopak of CyberVignan
  • Yarin Rehtan of Cyberint
  • Yassine Algangaf of Ste.Pico-Tech
  • Yassine Nafiai
  • Youssef Abyaa
  • 阿刁

February 2018 Security Researchers

  • Aamir Rehman Yousafzai
  • Abhishek Sidharth
  • Adam Brand of Protiviti
  • Benjamin Kunz Mejri - Vulnerability Laboratory & Evolution Security GmbH
  • Adi Ivascu
  • Amirhossein Shahin
  • Anas Mahmood
  • Ashutosh Kumar
  • Bhavuk Jain
  • Cameron Vincent
  • Dave Hewson of OnSecurity LLP
  • David Hoyt
  • Devansh Batham of Infoziant Labs
  • Florian Stosse (@Harvesterify) at Bureau Veritas
  • Harry M. Gertos (@GertyBoy27)
  • İsmail Şentürk
  • llt4l
  • Ismail Tasdelen
  • Jovon Itwaru
  • Kieran Jacobsen at Readify
  • Kirtikumar Anandrao Ramchandani
  • Kishore T K of Kruptos Security Club
  • Manish Kumar Gupta (Lethal Leet)
  • Martin Sundhaug (@Sundhaug92) at University College of Southeast Norway
  • Michael Hendrickx
  • Mikail Tunç
  • OMER FAREED of InterCyberSecurity
  • Patrik Hudak
  • Rahul Raj (@rahulr0cks)
  • Ralph Utz
  • Richard Shupak
  • Sadik Shaikh at Extreme Hacking
  • Shailesh Suthar
  • Shanmukh D
  • Shivam Kamboj Dattana (Nagal, Haryana) of NullSquad Haryana
  • Srikanth Suresh @srikwit at Wipro Limited
  • Suhas Sunil Gaikwad
  • Suresh C
  • Sureshbabu Narvaneni
  • Tyler Hawkins
  • Upendra Kumar at Central Depository Services (India) Limited
  • Vaibhav Gaikwad at D.Y.Patil college of engineering akurdi
  • Yassine Nafiai
  • Youssef A. Mohamed at RespondTeam.com

January 2018 Security Researchers

  • Ahmed Jerbi
  • Akalanka Ekanayake of WinterShift Security Center
  • Alfie Njeru
  • Ali Hassan Ghori | @alihasanghauri of Danalweb
  • Ankit Joshi at Pristine infosolutions
  • Anshul Lahoti
  • Ashar Javed of Hyundai AutoEver Europe GmbH
  • Ashutosh Kumar
  • Behroz Alam of OctaDev
  • Boštjan Špehonja
  • Cameron Vincent
  • Daniel Goldberg of Guardicore
  • Emad Shanab
  • Ertunga Arsal
  • Georgie Yoxall
  • கோபிநாத(Gopinath - Madurai)
  • Guifre Ruiz
  • Hamza Bettache
  • Harikrishna Valugonda
  • Ifrah Iman
  • Jasmin Landry
  • Jeevan Singh (Mr. M4fi4)
  • Jens Müller of Ruhr-University Bochum
  • Johan Haak
  • Jonathan Rice Whitehat Security
  • Karthic Kumar of Cisco
  • Kishore T K of Kruptos Security Club
  • Kunal Bahl
  • Kunal Khubchandani
  • Logan Whitmire
  • Love Sharma at Pristine InfoSolutions Pvt. Ltd.
  • Michael Benich of SecureState
  • Mohd Maroof at Pristine infosolutions
  • Muhammad Faizan Akhtar Student Security Researcher
  • Mustafa Hasan strukt
  • Nicodemo Gawronski (@nijagaw)
  • Nisheal A John of @nishujohn, India
  • Oran Nadler of Guardicore
  • PANKAJ ULHAS RANE
  • Prathik Parsi of vsigma it labs pvt ltd
  • Praveen Kumar Balasundaram of StarLink - Trusted Security Advisor
  • Rajanish Pathak
  • Rasi Afeef
  • Richard Shupak
  • rootz
  • Sakshyam Shah
  • Sam Eizad at Certezza
  • Sharath Sudhakar
  • SHARIK KHAN (Anon_Hunter)
  • Shiv Bihari Pandey @ninja_pandit_ of Cyethack Solutions
  • Suresh C
  • Suyog Palav
  • Sviatoslav Toropchanin (@storopchanin)
  • Taha Ibrahim DRAIDIA
  • Thierno DIOP
  • Thrivikram Gujarathi
  • Kyaw Min Thein | UTYCC
  • todaro of HillStone_saintsec
  • Vikash Chaudhary CEO & Founder at Hackersera Cyber Security Consultancy and Training PVT LTD
  • Vishal Jadhav
  • Yannis PARIMEROS
  • Yassine Nafiai
  • YongShao (Zhi Yong Feng) of Mobike Security Team
  • Youssef ABYAA
  • Vyshnav Nk
  • Zain Sabahat

December 2017 Security Researchers

  • Ahmed Radi
  • Ameer Hamza Ashfaq
  • Ajay Anand CTG Security Solutions
  • Akaash Sharma of Black Panther Security
  • Akast of SAINTSEC
  • Akram Lagrazna of HighSecure
  • Alexander Sidukov of Positive Technologies
  • Alfie Njeru
  • Aman Mahendra
  • Ameer Hamza Ashfaq
  • Anurag Jain (@csanuragjain)
  • Ashar Javed @soaj1664ashar) of Hyundai AutoEver Europe GmbH
  • Cameron Dawe of Spam404
  • Cameron Vincent
  • Cem Onat Karagun
  • Kocaeli University
  • Chacko K Abraham
  • Charafeddine Nassiri
  • Daniel Díez Tainta
  • Frank B. Vickers
  • Frans Rosén
  • Detectify
  • Gopinath(கோபிநாத்) - Madurai)
  • Harsh Jaiswal
  • İsmail BÜLBÜL
  • Jouko Pynnönen at
  • Klikki Oy
  • Jasmin Landry
  • Jovon Itwaru at Core Defend
  • Kamal Kothyari
  • Kenan Can
  • Kishan Kumar
  • Latish Danawale of EY
  • Logan Whitmire
  • Marvin van Walstijn
  • Michail Bolshov , bigbear.pro
  • Mohammed Rishad
  • Muhammad Amir Naseem of BTAM
  • Mustafa Hasan
  • Nethanel Gelernter
  • Cyberpion
  • Nisheal A John of
  • Pubudu Priyashan Iddamalgoda of Hawk Security
  • Rafael Rivera
  • Rahul Dattatraya Kankrale of
  • Servicenger LLP
  • Rajwinder Singh
  • Raja Uzair Abdullah
  • Richard Shupak
  • Roberto Empijei Clapis
  • Sachin Wagh (@tiger_tigerboy)
  • SaifAllah benMassaoud
  • Shoaib F.Sheikh at PWC
  • Sidney FALHUN
  • SPQR
  • Suresh C
  • Taha Ibrahim DRAIDIA
  • Tansel ÇETİN
  • Umesh Prakash Jore
  • Vasim Shaikh of Vidyalankar Institute of Technology (VIT)
  • Vikash Chaudhary
  • CEO & Founder at Hackersera Cyber Security Consultancy and Training PVT LTD
  • Yeasir Arafat
  • Yong Chuan Koh

November 2017 Security Researchers

  • Abhishek Shroti (@fake_politics) of
  • Hacks and Security
  • Adam Piggott of
  • Proactive Services (Computing)
  • Ajay Kulal of
  • Dr. Homi Bhabha Vidyalaya,Tarapur
  • Akalanka Ekanayake of
  • Secure Hacker Project
  • Ali Tütüncü
  • TurkHackTeam
  • Adesh Nandkishor Kolte
  • Adrian Ivascu
  • AhsanKhan
  • Akaash Sharma
  • Black Panther Security
  • Alok Saurabh (Godzilla) of
  • PwC India
  • Ameer Hamza Ashfaq
  • Arif ISIK
  • WeedSquad of G.O.R.A.
  • Cameron Dawe
  • Spam404
  • Ameer Hamza Ashfaq
  • >Aouiss Abdelhak
  • Ashar Javed @soaj1664ashar) of Hyundai AutoEver Europe GmbH
  • Appidi Saikumar Reddy
  • Cameron Vincent
  • Cem Onat Karagun
  • Kocaeli University
  • Chetan Soni
  • Efkan Gokbas
  • Gopinath(கோபிநாத்) - Madurai
  • Huynh Phuoc Hung,
  • @hph0var
  • İsmail BÜLBÜL
  • Ivan Vagunin
  • Jens Mueller
  • Ruhr-University Bochum
  • Johan Haak
  • Kent Bayron
  • Manish Kumar Gupta (Lethal Leet)
  • Muhammed Ashik.P.P
  • Muhammad Aurangzaib
  • Mustafa Hasan
  • Nethanel Gelernter
  • Cyberpion
  • Noah Wilcox
  • RHEV
  • Raja Uzair Abdullah
  • Richard Shupak
  • Robin Ketelbuters
  • Gluo NV
  • Rolf Hammervik
  • Rudra Sarkar
  • Ronnie T Baby
  • Sidney Falhun
  • Sidney FALHUN
  • Sabri Haddouche (@pwnsdx)
  • Wire Swiss GmbH
  • Sadik Shaikh
  • Extreme Hacking
  • Sanket Katole
  • Extreme Hacking
  • Suresh C
  • Vikash Chaudhary CEO at
  • HackersEra Cyber Security Consultancy and Training Pvt Ltd
  • Yeasir Arafat
  • Viral Bhatt
  • Zain Sabahat

October 2017 Security Researchers

  • Ashar Javed @soaj1664ashar) of Hyundai AutoEver Europe GmbH
  • Assaf Weizman
  • Palantir Security LTD
  • Cameron Vincent
  • Cem Onat Karagun
  • Kocaeli University
  • Devendra Ausa
  • Divine Hackerz
  • Evgeniy Yakovchuk
  • Furkan CONTAR
  • Gopinath(கோபிநாத்) - Madurai
  • Hoang Quoc Thinh(@g4mm4)
  • Cyber Jutsu Co.,Ltd
  • Husnain Iqbal (Bahria University Karachi)
  • Jens Mueller
  • Ruhr-University Bochum
  • Kamal Kothyari
  • Kanika Chaurasia
  • Krishna Manoj Vandavasi
  • Latish Danawale
  • EY
  • Lokesh Sharma
  • Marco Pizer and Sven Engel
  • STIHL
  • Marshal Webb
  • BackConnect, Inc.
  • Mohd Haji
  • Center of Excellence in Information assurance
  • Muhammad Aurangzaib
  • Mohamed Choulli
  • Mohammed Israil
  • VillageLad
  • Muhammad Uwais
  • Mustafa Hasan
  • Nakarajah Thuvarakan- யாழ்ப்பாணம்
  • Nilesh Sapariya
  • Omkar Ranjana Avasthi
  • Osman Hassan
  • Pal Patel
  • Richard Shupak
  • Sadik Shaikh
  • Extreme Hacking
  • Suresh C
  • TAHA SMILY
  • Vikash Chaudhary
  • Yeasir Arafat

September 2017 Security Researchers

  • Adesh Nandkishor Kolte
  • Dr. D.Y.Patil School of Engineering, Lohegaon, Pune
  • Ajay Kulal
  • BVCOE , Navi Mumbai
  • Akshay Borase
  • Akshay Deodare
  • Assaf Weizman
  • Ashar Javed @soaj1664ashar) of Hyundai AutoEver Europe GmbH
  • Athul Jayaram
  • Berk İmran
  • Bhavesh Varotaria
  • Krydence Technologies LLP
  • Bryan Appleby
  • Cameron Vincent
  • Cem Onat Karagun
  • Kocaeli University
  • Chris Dale
  • Netsecurity
  • Darshit Varotaria
  • Krydence Technologies LLP
  • Devendra Ausar
  • Divine Hackerz
  • Diogo Real
  • Dr. Thomas Jansen
  • Crissy Field GmbH
  • Furkan CONTAR
  • Gopinath(கோபிநாத்) - Madurai
  • Hoang Quoc Thinh(@g4mm4)
  • Cyber Jutsu Co.,Ltd
  • Husnain Iqbal (Bahria University Karachi)
  • Jonathan Wambach
  • Junaid Farhan
  • Jens Mueller
  • Ruhr-University Bochum
  • Kamal Kothyari
  • Kanika Chaurasia
  • Krishna Manoj Vandavasi
  • Latish Danawale
  • EY
  • Lokesh Sharma
  • Marco Pizer and Sven Engel
  • STIHL
  • Marshal Webb
  • BackConnect, Inc.
  • Mohd Haji
  • Center of Excellence in Information assurance
  • Mohamed Choulli
  • Muhammad Uwais
  • Mustafa Hasan
  • Nakarajah Thuvarakan- யாழ்ப்பாணம்
  • Nilesh Sapariya
  • Ons Ali
  • Pal Patel
  • Renjith T C
  • ValueMentor
  • Richard Shupak
  • Ruslan Sayfiev
  • Sadik Shaikh
  • Extreme Hacking
  • Sajibe Kanti
  • Suresh C
  • Tayyab Qadir (Bahria University Karachi)
  • Trent Lo
  • Yeasir Arafat
  • Zahid Ali

August 2017 Security Researchers

  • Abdelfattah Ibrahim
  • Abhijith P
  • Adam Bauer
  • Lookout
  • Adesh Nandkishor Kolte
  • Government poly Jalgaon MH-India
  • Adi Ivascu
  • Aditya Jadhav
  • Secure Cyber Future
  • Ahmed Radi
  • Ahsan Tahir
  • Ajay Gautam
  • Alwin Peppels
  • Amin Achour
  • Trading House Online
  • Ankit Singh
  • Ashar Javed ( @soaj1664ashar) of Hyundai AutoEver Europe GmbH
  • Cameron Vincent
  • Cem Onat Karagun
  • Kocaeli University
  • Daniel Dakhno
  • Dennis Egmond
  • Devendra Ausar
  • Divine Hackerz
  • Dipak Prajapati
  • Doğukan Karaciğer
  • Elijah (HexDecimal)
  • Gopinath(கோபிநாத்) - Madurai
  • Guhan Raja.L (Havoc)
  • Talented Pentesters Hut - TPH
  • Guillaume Crusca
  • Hamza Bettache
  • Honc (章哲瑜)
  • Huynh Phuoc Hung
  • Jean-François Kervella
  • Jerry Decime, Hewlett Packard Enterprise
  • Johns Simon
  • Baselios Mathews II college of engineering
  • Jovon Itwaru
  • Kanika Chaurasia
  • Mads Laursen
  • Mahmoud Abdelmonem
  • Mandeep Jadon
  • Mario Gomes
  • Masood Chaudhry
  • Michael Plucinski
  • Ring0 Technologies
  • Mohammed Ansari
  • Mohamed Choulli
  • Mohamed Mostafa
  • Mohamed Shahat
  • Nilesh Sapariya
  • Parvez Alam
  • Pavel Nakonechnyi
  • Gremwell
  • Per von Zweigbergk
  • Peter Jaric
  • Piyush Kumar
  • Richard Shupak
  • Rishi Mohanadas
  • Rodolfo Godalle, Jr.
  • Ronnie T Baby
  • Sabyasachi Dhal
  • Sachin Wagh(@tiger_tigerboy)
  • Sadik Shaikh
  • Extreme Hacking
  • Saleh Shaban
  • Saurabh Pundir
  • Sebastian Grünwald
  • Shivram (Shiv) Chouhan
  • Tadj Youssouf
  • OC3F.DZ
  • Tuan Anh Ngo
  • Vignesh.V
  • Ziaur Rashid
  • International Islamic University Chittagong, Bangladesh

July 2017 Security Researchers

  • Ahmed Radi
  • Ajay S. Kulal
  • Dr. Homi Bhabha Vidyalaya,Tarapur
  • Alvaro Muñoz (@pwntester)
  • Amal Jacob
  • Andrew Watts
  • eShare Ltd
  • Appidi SaiKumar Reddy
  • Ashar Javed ( @soaj1664ashar) of Hyundai AutoEver Europe GmbH
  • Cem Onat Karagun
  • Kocaeli University
  • Devi Prasad N
  • Efkan Gokbas
  • Elijah (HexDecimal)
  • கோபிநாத்(Gopinath) - Madurai
  • Hannes Karlsson
  • Jafar Hasan
  • Jens Müller
  • Jon Bottarini
  • Joseph Jose
  • Kartik Singh
  • Kishore TK
  • talented pentesters hut
  • Krishnapal Sharma
  • LAISHAJ BM
  • Manish Kumar Gupta
  • Mikhail Egorov
  • milkwort。(Yuanzhi Luo)
  • Mithat Gogebakan ( @mithatgogebakan) of Netsparker
  • Muhammad Mudassar Yamin
  • Muhammad Uwais
  • Nethanel Gelernter
  • Cyberpion
  • Neelesh Swami
  • Peter Jaric
  • Prakash Sharma
  • Richard Shupak
  • Ronnie T Baby
  • Sadik Shaikh
  • Extreme Hacking
  • SaifAllah benMassaoud
  • Vulnerability-Lab
  • Sam Macbeth
  • Cliqz GmbH
  • Sanjay Singh Jhala
  • Shahar Albeck (@l33terally)
  • @FogMarks
  • Shubham Agarwal
  • Shaifullah Shaon (Black_EyE)
  • Sreedeep.Ck Alavil
  • Kerala Police Cyber Dome Volunteers Commander
  • Sreeram KL
  • Sumit Sahoo (54H00)
  • Suvadip Kar
  • Sven Soltermann
  • Vartul Goyal
  • Vivek Krishna A
  • Will Russell
  • Yaala Abdellah
  • Yannis Parimeros
  • Yeasir Arafat
  • Ziaur Rashid
  • (Cyb3r Command0s, Bangladesh)

May & June 2017 Security Researchers

  • Abhineeti Singh
  • Abhishek Sidharth
  • Abiral Shrestha (@abralxhrextha)
  • Rigo Technology
  • Adesh Nandkishor Kolte
  • Government poly Jalgaon MH-India
  • Adi Ivascu
  • Ahmed Adel Abdelfattah
  • Ahmed Raza Memon
  • Ajay S. Kulal
  • Dr. Homi Bhabha Vidyalaya,Tarapur
  • ak1t4
  • Alan ZACCARDELLE
  • Alec Blance
  • Alexandru Cioc
  • Amal Jacob
  • Amichai Shulman
  • Ashar Javed
  • Avinash Sudhodanan
  • SECENTIS Project
  • Bikash Mallick
  • Cameron Vincent
  • Dhamu Harker @Dhamuharker
  • Defencely
  • Dr. Sohrab Behrouzian
  • Frans Rosén
  • Detectify
  • Gayatri Rachakonda
  • Ge Peng
  • College of William & Mary
  • Gopinath Kandasamy
  • Guillaume Berleur
  • Haining Wang
  • University of Delaware
  • Hamza Bettache
  • Hannes Karlsson
  • Harry M Gertos
  • Hassan Khan Yusufzai
  • Ian Dunn
  • Automattic, Inc
  • Jafar Hasan
  • Jan Horacek
  • Etnetera
  • Jasmin Landry
  • SecureOps
  • John Leitch
  • AutoSec Tools
  • John Robb
  • Khaled Hassan Ayad
  • SeeCureApp
  • Khaled Sakr
  • M.Harsha Vardhan
  • Mahad Ahmed
  • Security Geeks
  • Mahmoud Gamal
  • Seekurity
  • Mandeep Jadon
  • Markus Alvila
  • Matthew Mawby
  • Md. Azharuddin
  • Cyberaon Technologies, Inc.
  • Michael Kurrels
  • Oui Develop
  • Miguel Méndez Zúñiga (@s1kr10s)
  • Mithat Gogebakan
  • ( @mithatgogebakan) of Netsparker
  • Mohd Haji
  • Mrityunjoy Emu (Beetles.io)
  • Muhammad Kazim
  • Nicolas Dolgin
  • SECENTIS Project
  • Nitin Pandey
  • Hackers Day
  • Phillip Whipps
  • UNIFY Solutions
  • Richard Shupak
  • Robin "Japz" Divino
  • Rudra Sarkar
  • S.Venkatesh
  • Sadik Shaikh
  • Extreme Hacking
  • Sahil Tembhare
  • Sahil Tikoo
  • Shaifullah Shaon (Black_EyE)
  • SQLi Basic
  • Sherif Afifi
  • Shuai Hao
  • College of William & Mary
  • Shuvamoy Roy
  • Sigmund Kreuzer
  • Sreedeep.Ck Alavil
  • Kerala Police Cyber Dome Volunteers Commander
  • Suresh C.
  • Tal Be’ery
  • Vaclav Jirovsky
  • O2 Czech Republic
  • Vikas Kumar Pal
  • Loginsoft/Sonatype
  • Wai Yan Aung
  • Yongjin Kim
  • adm1nkyj@UpRoot
  • Yorrick Hardeman
  • Fanorg
  • Yosuke Hasegawa
  • Secure Sky Technology Inc.
  • Yuji Tounai
  • NTT Com Security (Japan) KK
  • Yuvanesh P
  • Zahan Ahmad
  • Security Training
  • Zain Sabahat

April 2017 Security Researchers

  • Adesh Nandkishor Kolte
  • Adrian Ivascu
  • Alex Kolchanov
  • Alexandros Zacharis
  • ENISA
  • Anatolii Bench
  • Arun Kumar Agrawalla
  • Ashar Javed (@soaj1664ashar)
  • Hyundai AutoEver Europe GmbH
  • Avinash Sudhodanan
  • SECENTIS Project
  • Cameron Dawe
  • Spam404
  • Daley Borda
  • Blue Screen IT
  • Damon Lamount Montague Jr.
  • Emmanuel Law
  • Eric Turpin
  • Chick-fil-A, Inc.
  • Gopinath(கோபிநாத்) - Madurai
  • Hamza Bettache
  • Javier S. Lirola
  • Jerold Hoong
  • Jolan Saluria
  • Philippine Cyber Army
  • Md Sameull Soykot
  • Beetles
  • Mhammad Al Abdullah
  • Mohamed A. Baset
  • Seekurity SAS de C.V.
  • Muhammad Awais Noshahi
  • N00b St00rm
  • Nicolas Dolgin
  • SECENTIS Project
  • Oskari Pétas
  • Preetisagar parida
  • R. Sanoj Kumar
  • Rafael Pablos
  • Richard Shupak
  • RuiChong
  • Baidu Inc.
  • Sadik Shaikh
  • Extreme Hacking
  • Sergey Mayorov
  • Shawar Khan
  • SHWETABH SUMAN ( @SHWETABHSUMAN11 )
  • Siddhartha Tripathy
  • SEC Consult
  • Sreedeep.Ck Alavil
  • Kerala Police Cyber Dome Volunteers Commander
  • Suhas Sunil Gaikwad
  • Suresh C
  • Vishal Shukla

March 2017 Security Researchers

  • Abdelfattah Ibrahim
  • Adi Ivascu
  • Ajay Kulal
  • Dr. Homi Bhabha Vidyalaya Tarapur
  • Amit Sangra
  • Tula's Institute, Dehradun
  • Anand Bhat
  • Anatolii Bench
  • Ashar Javed (@soaj1664ashar)
  • Hyundai AutoEver Europe GmbH
  • Ashutosh Kumar
  • Cyber Peace Foundation
  • Avinash Sudhodanan
  • SECENTIS Project
  • Mazlum Bozan
  • Güvenlik Açığı İstihbarat Servisi
  • Cameron Dawe
  • Spam404
  • Cameron Vincent
  • Corben Douglas (CDL)
  • Project Insecurity
  • Dylan Katz
  • Faast Team
  • ElevenPaths
  • Frans Rosén
  • Detectify
  • Haider Kamal
  • Institute of business & technology karachi (biztek) Student
  • Harry M Gertos
  • Hassan Khan Yusufzai
  • Koutrouss Media
  • Honc (章哲瑜)
  • Ibrahim Husić
  • İlyas ORAK(@ilyasorak_)
  • Biznet Bilişim
  • Jasmin Landry
  • SecureOps
  • Jayson Vasquez Rubio
  • Blackhat Asia Security (Iloilo Science And Technology - University)
  • Jens Müller
  • Kitwipat Towattana
  • Thailand
  • Kravchenko Stas
  • Kshitij Khakurdikar
  • Kumonie Williams
  • Mahmoud Osama
  • Mandeep Jadon
  • Michael Sazbon
  • Mohamed A. Baset
  • Seekurity
  • Muhammad Mudassar Yamin
  • Nicolas Dolgin
  • SECENTIS Project
  • Osama Ansari
  • Ralph Perry
  • 360° Business/IT Consulting, LLC
  • Richard Shupak
  • Saad Loukili
  • Shahar Albeck (@l33terally)
  • @FogMarks
  • Tadj Youssouf
  • Oc3f.dz
  • Tim Naylor
  • Tommy DeVoss
  • Devops Solution
  • V.Vignesh
  • Prathyusha Engineering College
  • Vipin Chaudhary
  • 360 Helios Team

February 2017 Security Researchers

  • Abiral Shrestha (@abralxhrextha)
  • Rigo Technology
  • Ahmed Atef abdou
  • Ajay Shankar Kulal
  • Ak1t4
  • Ali Shah Imtiaz
  • Amaresh Pattanayak
  • Anand Prakash
  • Anatolii Bench
  • Andi Rrahmani
  • Cameron Dawe
  • Spam404
  • Cameron Vincent
  • Christophe GARRIGUES
  • NES
  • Haider Kamal
  • Institute of Business & Technology Karachi (biztek) - Student
  • Hazim Aslam
  • Jake Bernier
  • Jeevan Singh
  • Joe Kirwin
  • John Page aka hyp3rlinx
  • ApparitionSec
  • Koutrouss Naddara
  • Koutrouss Media
  • Kristoffer Naterstad Seljestad
  • Mehmet Caner Köroğlu
  • InnoveraBT
  • Michel Gaschet--Clousier
  • Nirmal Thapa
  • Niv Levy
  • 2BSecure
  • Paresh Parmar
  • Pedro Cardoso
  • Richard Shupak
  • Rishabh Sharma
  • Torrid Networks
  • Robin "Japz" Divino
  • Rui Chong
  • Baidu Inc
  • Suresh C
  • Vignesh V & Praveen K C
  • Prathyusha Engineering College

January 2017 Security Researchers

  • Amol Dattatray Baikar
  • Adi Ivascu
  • Ajay S. Kulal
  • Alwin Peppels
  • Ankit Singh
  • Anatolii Bench
  • Abdel Hafid Ait Chikh
  • Moroccan Hackers - الهاكرز المغاربة
  • Adam Chester (@_xpn_)
  • Adrian 'Vizzdoom' Michalczyk
  • Amine Marzouki
  • Andreas Eliasson
  • Ashar Javed (@soaj1664ashar)
  • Hyundai AutoEver Europe GmbH
  • Ashutosh Kumar
  • Cyber Peace Foundation
  • Çagri El
  • Cameron Vincent
  • Filippo Cavallarin
  • Segment Srl
  • Faiz Ahmed Zaidi
  • Gavin Morrison
  • Hamza Zulfiqar Bhatti
  • Harry M Gertos
  • Haytham Eghbariah
  • Helen
  • Recx Ltd.
  • Johan Rydberg Möller
  • Assured AB
  • John Dunlap
  • Gotham Digital Science
  • Kravchenko Stas
  • Mandeep Jadon
  • Maximilian Kretschmer
  • Bloss GmbH & Co. KG
  • Muhammad Kazim
  • Najeeb Uddin
  • Narendra Bhati
  • Norm Alderson
  • Raphael de la Vienne (hackdwerg)
  • ilionx
  • Richard Shupak
  • Shahar Albeck
  • FogMarks.com
  • Suleman Malik
  • Tanuj Jane
  • V.Vignesh
  • Prathyusha Engineering College
  • Walentin Helling
  • Walid Kerroumi
  • Youssef Lahouifi

December 2016 Security Researchers

  • AbedAlqader Swedan
  • Aditya Yadamreddy & Sandeep Gumadam
  • Jda software
  • Ajay Shankar Kulal
  • Akshay Jain
  • Alwin Peppels
  • Anas Laabab
  • SECUTRIFY
  • Arbin Godar
  • Atul Kishor Jaiswal
  • Torrid Networks Pvt. Limited
  • Daniel Augustyn
  • Gökay Gündoğan
  • Hadji Samir
  • Jafar Hasan
  • Karim Valiev
  • Mail.Ru Group
  • Marc-Alexandre Montpas
  • Nicholas R
  • Parvez Alam
  • Blackroot Technologies
  • Paul Bandha
  • Paul C. Haley
  • City of Seattle, Security, Risk, and Compliance
  • Praveen Kumar Balasundaram
  • Black Knight Financial Services
  • Prial Islam
  • ErrOr SquaD - Bangladesh
  • Richard Shupak
  • Samuel Orellana
  • Sascha Damoiseaux
  • Shayan Erfanian Mehrsaz
  • Pishro Co
  • Vignesh V
  • Prathyusha Engineering College
  • Vincent Junik

November 2016 Security Researchers

  • Abdullah Ahmet ERDEM
  • Abdulrahman AlQabandi
  • AbedAlqader Sweda
  • Ajay Anand
  • CTG Security Solutions
  • Ajay S. Kulal
  • Akbar kp
  • Amine HM
  • Anatolii Bench
  • Artur Baranok
  • Christian August Holm Hansen
  • Watchcom Security Group
  • Coltuneac Alexandru
  • Eric Head
  • CodeCanCare
  • Eric Lawrence
  • FaasT Team
  • ElevenPaths (Telefónica Digital)
  • Fredrik Nordberg Almroth
  • Detectify
  • Gabriel Lima
  • Hannes Karlsson
  • Ivan Vagunin
  • Krishnendu Bhowmick
  • Mohd Aqeel Ahmed (Ciph3r00t)
  • ZenQ
  • Muhammad Amr Nasef
  • Mustafa Hasan
  • Najeeb Uddin
  • Nam Ha Bach
  • Piggybird
  • Nikolay Ermishkin
  • Nirmal Kirubakaran
  • Rahmat Nurfauzi
  • Rahul Pratap Singh
  • Richard Shupak
  • Somesh Yadav
  • Tim Stamp (stampycode)
  • Rakuten Marketing
  • Valerio Aimale
  • FireEye, Inc.
  • Zee Shan

September & October 2016 Security Researchers

  • Aamir Rehman
  • Adi Ivascu
  • Ahsan Tahir
  • Ameer M. Assadi
  • Amit Sangra
  • Tula's Institute,Dehradun
  • Anand Tendolkar
  • Anas Roubi
  • Andi Rrahmani
  • Ashar Javed
  • Hyundai AutoEver Europe GmbH
  • Bekasi0d0nk
  • Bekasi Cyber Community
  • Cameron Dawe
  • Spam404
  • Cameron Vincent
  • Cem Yıldırım
  • Charan Mukkamala
  • Entersoft Security
  • David Albert
  • Ender Akbaş
  • BGA Security
  • Faast Team
  • ElevenPaths
  • Gaurav Mishra
  • Geet Vaishnav
  • Hadji Samir
  • Harry M. Gertos
  • Hasnain Alam
  • Jayson Vasquez Rubio
  • Jerold Hoong
  • Karim Valiev
  • Mahmoud Osama Ahmed
  • Manish Agrawal
  • RaipurTricks
  • Mark van Tilburg
  • van Tilburg Software
  • Melvin Lammerts
  • Mohammad Agha Sulaimanzai
  • Muhammad Mudassar Yamin
  • Nehal S. Ghoratkar
  • Sakurity Labs
  • Neil Kettle
  • Trustwave SpiderLabs
  • Nethanel Gelernter
  • Nishant Agarwala
  • Raad Firas Haddad
  • Rafael Fontes Souza
  • Rahul Dattatraya Kankrale
  • Servicenger
  • Rahul Mishra
  • Innovative Ideas Infotech
  • Raju H Patil
  • Infosec Labs Pvt Ltd
  • Richard Shupak
  • Roman Zaikin
  • Check Point Software Technologies
  • Sahil tikoo
  • Sreedeep.ck
  • Kerala police Cyber Dome Volunteers Commander
  • Stefan Kanthak
  • Stephan Somogyi
  • Google Security Team
  • Tim Naylor (@TimNaylorUK)
  • Tristan Madani
  • Ty Smith
  • Uber, Inc.
  • Utku Sen
  • V.Vignesh
  • Prathyusha Engineering College
  • Vikash Chaudhary
  • Hackers Era (founder)
  • Yuji Tounai
  • NTT Com Security (Japan) KK

July & August 2016 Security Researchers

  • Adrian Ivascu
  • Ahmed Jerbi
  • Alan Byrne
  • Cogmotive
  • Ashar Javed
  • Chacko Abraham
  • Constantinos Patsakis
  • University of Piraeus
  • Daniel Bakker
  • Derek Knight
  • Windows Insider MVP
  • Dr. Kai Chen
  • Institute of Information Engineering, Chinese Academy of Sciences
  • Efthimios Alepis
  • University of Piraeus
  • Elamaran V
  • BHEL Trichy
  • Evan Ricafort
  • Gayathri Rachakonda
  • Hamza Bettache
  • Harry Gertos
  • Harsh Yadav
  • Ivan Hwang
  • John Page
  • ApparitionSec
  • Keith Makan
  • Mohamed Sayed
  • Muhammad Mudassar Yamin
  • Muhammad Shahmeer
  • Cyphlon
  • Nikhil Mittal
  • Nill
  • Pankaj Upadhyay
  • Peter Adkins
  • rgod
  • Trend Micro's Zero Day Initiative
  • Richard Shupak
  • Rob Moss
  • Tweed & Talon Ltd
  • Rodolfo Godalle, Jr.
  • Sharz
  • Sundeep Gullapudi
  • Suraj Dangi
  • Rigo Information Technology Pvt. Ltd.
  • suresh c
  • Tim Naylor
  • Tongxin Li
  • Peking University
  • Waqar Vicky
  • XiaoFeng Wang
  • Indiana University at Bloomington
  • Xinhui Han
  • Peking University
  • Yangyi Chen
  • Indiana University at Bloomington

June 2016 Security Researchers

  • Abhishek Shroti
  • Adi Ivascu
  • Ahmad Amjad Alfoqha'a
  • Ahsan Tahir
  • Ajay Anand
  • Alan Byrne
  • Cogmotive Office 365 Reports
  • Alex Kolchanov
  • Andi Rrahmani
  • Arne Swinnen
  • Aworunse Matthew Temiloluwa
  • Cameron Dawe
  • Spam404
  • Cristian Tirelli
  • Dominic Scheirlinck and Scott Geary
  • Vend
  • Fredrik Almroth
  • Hamza Bettache (@Alfredgotu)
  • Hannes Karlsson
  • Ivan Hwang
  • K. Mohan Sai Krishna
  • Kane Gamble
  • Kunal Arora
  • Lakshmanavaradhan G
  • Latish Danawale
  • Lawrence Amer
  • Evolution Security GmbH (Vulnerability Laboratory)
  • Mahmoud Reda
  • Michael Reizelman
  • Michail Bolshov
  • Mohamed Ramadan
  • Attack-Secure
  • Muzaffar Mulla
  • Nethanel Gelernter
  • Patel Ashish. N.
  • Pranab Jyoti Roy
  • Richard Shupak
  • Rohan Bangera
  • S. Venkatesh
  • Sachin Pagare
  • Sachin Wagh (tiger_tigerboy)
  • Shailesh Suthar
  • Shubs
  • Stefano Vettorazzi
  • Sumit Sahoo
  • Suraj Mulik
  • suresh c
  • Travis Emmert
  • Salesforce.com

May 2016 Security Researchers

  • arjun v (7h0r4pp4n)
  • Adam Kramer
  • Ahmad Ashraff bin Ahmad
  • Ahmed ALaa
  • EG-CERT
  • Ajay Anand
  • CTG Security Solutions™
  • Amir Saad
  • Ashish Padelkar
  • Bigbear, Michail Bolshov
  • Cameron Dawe
  • Spam404
  • Daniel Bakker
  • Deepanker Chawla
  • Edison He
  • Florian Kunushevci
  • Hadji Samir
  • Evolution Security Gmbh (Vulnerability Lab)
  • Hamza Bettache
  • Hanno Böck
  • Harry Gertos
  • Hugo Santiago dos Santos
  • Luciano Corsalini
  • Mahmoud Abdalazez
  • llo unlimited
  • Mohamed Ramadan
  • Attack-Secure
  • Muhammad Osama
  • Mustafa Hasan
  • Muzaffar Mulla
  • CTG Security Solutions™
  • Pranab Jyoti Roy
  • CTG Security Solutions™
  • Provensec
  • Provensec
  • Richard Shupak
  • Rob Moss
  • Tweed & Talon Ltd
  • Rodolfo Godalle, Jr.
  • Rohan Bangera
  • CTG Security Solutions™
  • Sachin Pagare
  • CTG Security Solutions™
  • Sami Drif
  • Satish Bommisetty
  • Shawar Khan
  • Suresh C
  • Vijay Kumar Chaudhary
  • yongshao (zhiyong Feng)
  • JDSEC

April 2016 Security Researchers

  • Adam Muntner
  • Mozilla Corp.
  • Adi Ivascu
  • Ahmad Raza Memon
  • CTG Security Solutions™
  • Ajay Anand
  • CTG Security Solutions™
  • Ajay Singri
  • CTG Security Solutions™
  • Amit Kumar(Ak)
  • Tula's Institute, Dehradun
  • Arthur Khashaev
  • Ashar Javed (@soaj1665ashar)
  • Hyundai AutoEver Europe GmbH
  • Bilal Elbouardi
  • Cameron Dawe
  • Spam404
  • Chris McCown
  • Dinesh vicky
  • François Goichon
  • Context Information Security
  • Hamza Bettache
  • Jakub Palaczynski
  • ING Services Polska
  • Jason Sajdak
  • Acumium
  • Jatinder Singh Saini
  • hackerDesk
  • Jose Carlos Exposito Bueno
  • 0xlabs
  • Johnny Wang
  • Karim Rahal
  • [Karim@karimrahal.com / KarimMTV@elitesec.org], @KarimPwnz
  • Kieran Claessens
  • @KieranClaessens
  • Kiran Shirali
  • Kumar M
  • CTG Security Solutions™
  • Minture
  • Mohammad Reza Espargham
  • RamonaGroup
  • Mohit Rawat
  • Muhammad Mudassar Yamin
  • Muhammad Shahmeer
  • Cyphlon
  • Nilesh Sapariya
  • Othmane Tamagart
  • Priyanshu Sahay
  • HackersOnlineClub
  • Richard Shupak
  • Satish Bommisetty
  • Sergey Markov
  • Shailesh Suthar
  • Shamanth Rao
  • WeSecureApp
  • Sumesh Gopu
  • CTG Security Solutions™
  • Sumit Sahoo
  • 54H00
  • Sundeep Gullapudi
  • https://www.facebook.com/gsundeep.tech
  • Sven Soltermann
  • Vijay Kumar Chaudhary
  • Waqar Vicky
  • wolf(weijun lin)
  • future-sec
  • Yongshao(Zhiyong Feng)
  • JDSEC
  • عبد الحفيظ أيت الشيخ

March 2016 Security Researchers

  • Aaron Costello
  • Abdallh Bin Hatheem Ali (GeeSuth)
  • Abdel Hafid Ait Chikh
  • Adeel Imtiaz
  • Ahmed Adel Abdelfattah
  • Aisling Connolly
  • Ajay Anand
  • CTG Security Solutions™
  • Akshay Jain
  • Ayoub FATHI
  • Sacurify
  • Baba Fakruddin
  • CTG Security Solutions™
  • Bilal Elbouardi
  • Bjoern Reinhardt
  • bridingIT
  • Blancke Enzo
  • Cameron Dawe
  • Spam404
  • Daniel Bakker
  • David Ferreira
  • char49
  • David Naccache
  • Deep Yadav
  • CTG Security Solutions™
  • Dipen Bharat Patel, CEH
  • Ender Akbaş
  • Normshield Research Team
  • Er Pratik Panchal
  • Infobit Technologies
  • Hadji Samir
  • Evolution Security GmbH (Vulnerability Lab)
  • Hadrien Barral
  • Harsh jaiswal & Rudra
  • Hasan Emre Özer
  • Liseli LLC
  • Herman Stevens
  • Houda Ferradi
  • Jakub Palaczynski
  • ING Services Polska
  • Karl Aparece
  • Kenan GÜMÜŞ
  • Latish Danawale
  • Pristine Infosolutions
  • M.R.Sivakumar(மு.ரா.சிவகுமார்)
  • Mahmoud EL Manzalawy
  • Manolache Silviu
  • Marc Beunardeau
  • Mike Minchinton
  • Digital Assurance
  • Mohamed Ramadan
  • Attack-Secure
  • Mohammed Al Bess, Mohammad Abuhassan
  • H and Anonfantom
  • Mohit Kalsi
  • CTG Security Solutions™
  • Omer Iqbal
  • Poomalar Selvan
  • CTG Security Solutions™
  • Ravishanker Kusuma
  • Rémi Géraud
  • Richard Shupak
  • Rohit Shaw
  • Saurabh Pundir
  • Torrid Networks Pvt Ltd.
  • Shailesh Suthar
  • Shamanth Alladi
  • wesecureapp
  • Steve Syfuhs
  • Sundeep Gullapudi
  • Thibaut Heckmann
  • Yuji Tounai
  • NTT Com Security (Japan) KK
  • Ysrael Gurt
  • BugSec

February 2016 Security Researchers

  • Abdel Hafid Ait Chikh
  • Ayoub SAFA
  • Bjoern Reinhardt
  • bridingIT
  • Bülent Albayraksaran
  • FolgeX Electronics
  • Cameron Dawe
  • Spam404
  • Chris Vickery
  • MacKeeper
  • Daniel Laczi
  • Deutsche Telekom
  • Dennis Moes
  • Dharamvir bisht
  • Griffin Francis
  • Whitehack
  • Hadji Samir
  • Evolution Security GmbH (Vulnerability Lab)
  • Hamza Hnach
  • TmRABATSALE
  • Harry Gertos
  • Ioannis Kakavas
  • Greek Research and Technology Network S.A.
  • Jack "fin1te" Whitton
  • Jonas Nilsson
  • Disruptive Innovations AB
  • Karim Rahal
  • [Karim@karimrahal.com / KarimMTV@elitesec.org] - @KarimPwnz
  • Karim Valiev
  • Kharim Mohammed
  • Klemen Bratec
  • Šola prihodnosti Maribor
  • Lewis Kimber
  • Mahmoud EL Manzalawy
  • Mandeep Singh Jadon
  • Krishna Institute Of Engineering And Technology
  • Michel Gaschet -- Clousier
  • Murat Yilmazlar
  • Canyoupwn.me
  • Nicholas Francois aka "Meow"
  • Paresh Parmar
  • Richard Shupak
  • Rodolfo Godalle, Jr.
  • Safouane A.
  • Yassine ABOUKIR
  • Hacktify, Inc

January 2016 Security Researchers

  • Aakash kumar
  • Abbassi Ahmed Jalal
  • Abdel Hafid Ait Chikh
  • Adi Ivascu
  • Ali Kabeel
  • Amr Khalid Aly
  • Chris McCown
  • Coltuneac Alexandru
  • Faizan Ahmad
  • Hannes Karlsson
  • Harry M. Gertos
  • Hazim Aslam
  • White Hat Dude
  • Jack "fin1te" Whitton
  • Jonas Obrist
  • HDE, Inc
  • K. Mohan Sai Krishna
  • Nehal S. Ghoratkar
  • Sakuritylabs
  • Nirmal Kirubakaran
  • Paresh Parmar
  • Richard Shupak
  • Safouane Ait.
  • Saurabh Pundir
  • Torrid Networks Pvt Ltd.
  • Sebastian Nickel, ''@feink0st'
  • Shashi Kiran
  • Suresh C
  • Wesley Wineberg
  • Synack

December 2015 Security Researchers

  • Abbassi Ahmed Jalal
  • Abdel Hafid Ait Chikh
  • Adi Ivascu
  • Ahmed Adel Abdelfattah
  • Alistair Rolfe
  • Ayoub Nait Lamine
  • Brute Logic
  • Sucuri Security
  • Coltuneac Alexandru
  • Danijel Maksimovic
  • David Sopas
  • Faiz Ahmed Zaidi
  • Faizan Ahmad
  • Ivan Grigorov
  • Kai Lu
  • Fortinet's FortiGuard Labs
  • Michael Theriot
  • Mohd Haji
  • Mustafa Hasan
  • Nehal S. Ghoratkar
  • Sakuritylabs
  • Pablo Sacristan del Junco
  • Richard Shupak
  • Rashmil Tyagi
  • Sri Aurobindo Society
  • Rui Silva
  • SaifAllah benMassaoud
  • Shawar Khan
  • Soufiane Boussali
  • Sumit Sahoo
  • 54H00
  • Suresh C
  • wtm
  • Offensi
  • November 2015 Security Researchers
  • Abdel Hafid Ait Chikh
  • Abdulrahman Alqabandi
  • Adeel Imtiaz
  • Ayush Gupta
  • Coltuneac Alexandru
  • Daniyal Nasir
  • Zetrew
  • Dinesh Vicky
  • Frank Giuliani
  • BAE Systems Applied Intelligence
  • Fredrik Nordberg Almroth
  • Detectify
  • Jim O'Leary
  • Jun Kokatsu
  • K. Mohan Sai Krishna
  • Kethireddy Sravan Kumar Reddy
  • Blacklisted World
  • Mazen Gamal Mesbah
  • Mehmet Nurcan
  • Muhammad Zeeshan
  • Muhammed Gamal Fahmy
  • Mustafa Hasan
  • Raghav Bisht
  • Richard Shupak
  • Russel Van Laurio (QCPIAN Grayhat)
  • Siddhartha Tripathy
  • Suresh C
  • Vinoth Kumar
  • Zhang Xujun
  • Alibaba Security Agency

October 2015 Security Researchers

  • Adi Ivascu
  • Alex Chepovetsky
  • Amir Borovac
  • Anton Staykov
  • Antonio Sanso
  • @asanso
  • AppCheck-NG
  • AppCheck
  • b54c0424182a61889391f154c724511c
  • Emiel Florijn
  • Leakfree IT Security
  • Gerardo Venegas
  • Hamza Bettache
  • @alfredgotu
  • Justin Hopple
  • VMware CTU
  • Karim Rahal
  • Kieran Claessens
  • Mandeep Singh Jadon
  • Martin Hall
  • Mahmoud EL Manzalawy
  • Mohammed Amine El-Attar
  • FuzzASM
  • Nehal Sudhir Ghoratkar
  • Niv Levy
  • Richard Shupak
  • SaifAllah benMassaoud
  • Salem Faisal Elmrayed (kaito_kid)
  • Santiago López
  • Weijun Lin (wolf)
  • Future sec
  • yongshao(Zhiyong Feng)
  • TASS Laboratory

September 2015 Security Researchers

  • Abdulrahman Alqabandi
  • Ahmed Adel Abdelfattah
  • Ahmed Jerbi
  • Web Plus
  • Anatolii Bench
  • Ashar Javed
  • Hyundai AutoEver Europe GmbH
  • Cedric Van Bockhaven
  • Enrico Cinquini
  • aizoOn
  • James Allan
  • Justin Khoo
  • FreshInbox
  • lokihardt@ASRT
  • working with HP's Zero Day Initiative
  • Lukas Kempf
  • Masato Kinugawa
  • Muhammad Zeeshan
  • PAF KIET AND TEAMROX
  • Neelesh Swami
  • Pflash Punk & Virender C Nishad
  • Blackroot Technologies
  • Prashanth varma
  • Richard Shupak
  • Roberto Zanga
  • Sadia Farid Promi
  • Sean Roesner
  • Sree Visakh Jain
  • Stefan Schurtz
  • Sutton Shin
  • Swaroop Yermalkar
  • Wesley Wineberg
  • Synack
  • Yakov Shafranovich
  • Zhang Xujun
  • Alibaba Security Agency

August 2015 Security Researchers

  • Ali Wamim Khan and Simone Memoli
  • AppCheck-NG
  • AppCheck
  • BaseDriller
  • Chand Singh
  • Christian Galeone, Yvann Le Fay & HaMa BeSt
  • Deepali Sarjerao Malekar
  • Dipak Kumar Das
  • Hamza Bettache
  • @alfredgotu
  • Ivano Somaini
  • Compass Security Schweiz AG
  • Jan KOPEC
  • Koutrouss Naddara
  • Krzysztof Wegrzynek
  • Lorenzo Fontana
  • Luciano Corsalini
  • Mahender Singh
  • Mahmoud EL Manzalawy
  • Mariano Di Martino
  • Martin Thirup Christensen
  • MD Nadim Zobaer (NIPU)
  • Eagle Eye
  • Mohamed Abdelbaset Elnoby
  • Seekurity - Information Security Consultations
  • Richard Shupak
  • Rodolfo Godalle, Jr.
  • SaifAllah benMassaoud
  • Saurabh Pundir
  • Torrid Networks Pvt. Ltd.
  • Shawar Khan

June & July 2015 Security Researchers

  • Abdullah Ahmet Erdem
  • Adi Ivascu
  • Ahmed Adel Abdelfattah
  • Ala Arfaoui
  • Ali Wamim Khan
  • Aluminium Security
  • Anirudh Anand (a0xnirudh)
  • Securethelock
  • Ankit Mittal
  • Anshuman Bhartiya
  • Antonio Sanso
  • Atulkumar Hariba Shedage
  • C Vishnu Vardhan Reddy
  • Christiaan Esterhuizen
  • Trustwave
  • Deepanshu Kapoor & Kameshwar Thakur
  • Dhayalan
  • Dimaz Arno Prasetio
  • Ethic Ninja
  • erevus@Knownsec
  • Knownsec
  • Gökay Gündoğan
  • Gopinath Madurai
  • Hamit ABİŞ
  • Miray
  • Hamza Bettache (@alfredgotu)
  • Hamza Hnach
  • Jatinder Singh
  • Heart Hacker
  • Joe Balhis
  • John Page
  • hyp3rlinx
  • Jon Erickson
  • Labs Dept of iSIGHT Partners
  • Jun Kokatsu
  • Karthik Rangarajan & Ankush Agarwal
  • Addepar
  • Linan Hao (@holynop)
  • Qihoo 360 Vulcan Team
  • Mohamed Abdelbaset Elnoby
  • Seekurity - Information Security Consultations
  • Mahmoud El Manzalawy
  • Manoj Kumar
  • Mehul Mohan
  • Mike Honey
  • Manga Solutions
  • Neelesh Swami
  • Nikhil Srivastava & Sunny Vaghela
  • TechdefenceLabs
  • Nikita Yerenkov-Scott
  • Parveen Yadav & Hemant Bansal
  • HB Systems
  • Paresh Parmar
  • Pouya Darabi
  • Pranav Meghsham Hivarekar
  • Rahul Pratap Singh
  • USICT, GGSIPU
  • Richard Shupak
  • SaifAllah benMassaoud
  • Samuel Becker
  • Saurabh Pundir
  • Torrid Networks Pvt Ltd
  • Shahmeer Amir
  • Maads Security
  • Stefan Kanthak
  • Sumit Sahoo
  • 54H00
  • Wesley Wineberg
  • yongshao (Zhiyong Feng)
  • TASS Laboratory

May 2015 Security Researchers

  • Ahmed Adel Abdelfattah
  • Jyoti Ranjan Acharya
  • Shahmeer Amir
  • Maads Security
  • Ala Arfaoui
  • Khaled Hassan Ayad
  • Hemant Bansal
  • Mo'men Basel
  • Mohamed Bassia
  • Cristi Caloianu & Dinu Alexandru
  • Romanian Security Team
  • Amine Cherrai
  • D4ta(Zhenhui Li)
  • FutureSec
  • Thom Does
  • Mohamed Elawadly
  • Ignacio Garrido
  • VerSprite
  • Rodolfo Godalle, Jr.
  • Nicolai Grødum
  • Cisco Systems, Inc.
  • Darija Ivanović
  • Adi Ivascu
  • Jack (linkcabin)
  • Roy Jansen
  • Security Researcher
  • Peter Jaric
  • Deepanshu Kapoor
  • Cyber Security Specialist
  • Deepanshu Kapoor & Kameshwar Thakur
  • Cyber Security Specialist
  • Aamir Khan
  • Nate Lawson
  • SourceDNA
  • Danijel Maksimović
  • Sergey Markov
  • Mehul
  • Roman Mironov
  • Sec-1 Ltd
  • Zeyad Khaled Mohamed
  • Darius Petrescu
  • Ranjan
  • Rishabh saxena
  • mav.rocks
  • Kamil Sevi
  • Md. Ishrat Shahriyar
  • Atulkumar Hariba Shedage
  • Richard Shupak
  • Gurjant Singh
  • hackerDesk
  • Jahanrajkar Singh
  • hackerDesk
  • Lovejot Singh
  • Cyber Defence Intelligence
  • Ranjeet Singh
  • David Sopas
  • Websegura
  • Neelesh Swami
  • Stas Volfus
  • Wesley Wineberg
  • Synack
  • Anas Abdullah Yousafzai

April 2015 Security Researchers

  • Gareth Bryan
  • Timico Limited
  • Ashish Pathak
  • BALAJI Msc.,CF&IS, CEH
  • Center of Excellence in Digital Forensics(CoEDF)
  • Behroz Mehboob
  • Cody L. Gilbert
  • TechSploit
  • Cristi Caloianu
  • RSTFORUMS
  • Hamza Bettache
  • Ilca Lucian
  • Pwnthecode
  • Joe Balhis
  • Juan Broullón Sampedro
  • Tarlogic Security
  • Justine Edic
  • M Asfar Irshad
  • Federal Urdu University, Islamabad
  • Mahmoud El Manzalawy
  • Mohamed Abdelbaset Elnoby
  • Seekurity Inc.
  • Morgan Price
  • Nate Lawson
  • SourceDNA
  • Rajat Sharma
  • Shivam
  • BaseZap
  • Sumit Sahoo
  • 54H00

March 2015 Security Researchers

  • 5up3rc(Cai yong)
  • JDSEC
  • Aamir Khan
  • Abdul Haq Khokhar
  • Iqra University
  • Abdul Rehman
  • Iqra University
  • Adi Ivascu
  • Ahmed Mehtab
  • Pakistan International School
  • Alexander Traud
  • Andrew Koenig
  • Andrey Labunets
  • Facebook
  • Artur Czyż
  • Cláudio André
  • Integrity S.A.
  • Darius Petrescu
  • Eric Flokstra
  • Eusebiu Blindu
  • Francisco Correa
  • George Filis
  • MalwareZone
  • Gerasimos Panou
  • Gurjant Singh
  • Hackerdesk
  • Harpal Singh
  • Hackerdesk
  • Hussain Adnan
  • J@lil @nd @l@yn
  • TeaM FireXploit
  • Joe Balhis
  • Juan Broullón Sampedro
  • Tarlogic Security
  • Kamran Saifullah
  • Koutrouss Naddara
  • Lalith Rallabhandi
  • Laurens Vents
  • Lukas Reicher
  • University of Applied Sciences Technikum Wien
  • Mahmoud El Manzalawy
  • Mario Gomes
  • Masaharu Nakagawa
  • Masato Kinugawa
  • Mikko Sydänmetsä
  • Missoum Said
  • Mohammad Ben Amoor
  • Muhammad Usman Saeed
  • Neelesh Swami
  • Peter Jaric
  • Prakash (@1lastBr3ath)
  • Entrust Solutions Nepal
  • Rafael Pablos
  • Rajat Sharma
  • Rodolfo Godalle, Jr.
  • Rui Wang and Stan Bounev
  • AppBugs
  • Shahmeer Amir
  • Maads Security
  • Shubham Gupta
  • Sreekanth Reddy
  • Vikas Khanna
  • Hackerdesk
  • Yash Pandya
  • Yassine Aboukir
  • Defencely
  • கோபிநாத்(Gopinath) - மதுரை(Madurai)

February 2015 Security Researchers

  • A. Evgeniy Sobolev
  • Practical Security Lab, LLC
  • AppCheck NG
  • Appcheck Ltd
  • Babar Khan Akhunzada
  • Security Wall
  • Ben Hayak
  • Collin Jackson
  • Carnegie Mellon University
  • David Silver
  • Stanford University
  • Dan Boneh
  • Stanford University
  • Eric Chen
  • Carnegie Mellon University
  • Eusebiu Blindu
  • Haseeb Ur Rehman
  • Huzaifa Jawaid
  • Jose Angel Torres
  • Duly Corporation
  • Khaled Hassan Ayad
  • Koutrouss Naddara
  • Kyron McKenna
  • Mahmoud Fawzi
  • The OneLeggedChicken Organization
  • Mirza Burhan Baig
  • BurhanBaig InfoSec!
  • Mohamed Elawadly
  • Mohammed Benamoor
  • lmaster
  • Mohammed Fayez Albanna
  • Mohd Haji
  • Moroccan Kingdom
  • MKD
  • Neelesh Swami
  • Paul Collison
  • Ralph Kapsammer
  • Rodolfo Godalle, Jr.
  • Sahil Saif
  • Sergey Markov
  • Stephen Sclafani
  • Sumit Sahoo
  • 54H00
  • Sunil Bhamare
  • Suman Jana
  • Stanford University
  • Yogesh Tantak
  • Yunusov Timur
  • Positive Technologies
  • Zhang Xujun

January 2015 Security Researchers

  • AbdulRahaman M.Baraka
  • Al-Quds Open University
  • Ajay Anand
  • CTG Security Solutions
  • Ali Salem Saeed (Ali BawazeEer)
  • Alun Jones
  • Texas Imperial Software
  • Andrew Pense
  • Horizon BCBS-NJ
  • Anurag Giri
  • Surgent10cross
  • Arsiadi Sriyanto
  • Ateeq Khan
  • GRC360 Pty Ltd
  • Ayoub Ait Elmokhtar
  • Evi10x
  • Cernica Ionut Cosmin
  • Erik van Paassen
  • Eusebiu Blindu
  • J@lil K@mel
  • TeaM FireXploit
  • Jack "fin1te" Whitton
  • Include Security
  • Joe Balhis
  • Jon
  • Bitquark
  • K Syed Kamarudheen
  • Karthik Reddy Chinnaganta, Balaji P R
  • Koutrouss Naddara
  • Mahmoud El Manzalawy
  • Mario Gomes
  • Mark Janssen
  • Mehul Rana
  • Gouptechnologies
  • Mohammed Waleed Alduraydi
  • Narendra Bhati
  • R00t Sh3ll
  • Neelesh Swami
  • Rafael Pablos
  • Robert Verderame
  • Robin Puri
  • Sahil Dhar - PIIT
  • Sergey Markov
  • Shahee Mirza
  • Shubham Gupta
  • Stephen Sclafani
  • Tom Verhoeff - Methylium

December 2014 Security Researchers

  • Anand Bhat
  • Abderrazak YS
  • Abdul Wasay - Exismedia
  • Abdelrhman Shawky
  • Abhibandu Kafle - Entrust solutions Nepal
  • Abhijeth D
  • Aditya Gujar
  • Ahmed Hassan Awan - Entrust solutions Nepal
  • Alex Davies
  • Ali Abdelakder - Act4Net
  • Ali Hassan Ghori - AHPT
  • Ali Salem Saeed (Ali BawazeEer)
  • Ashish Kumar
  • Ashish Tikarye
  • Asim Bilal
  • Bilal Kardadou - Tetouan4Ever
  • Carmine Altieri
  • Christian Galeone, Yvann Le Fay & HaMa BeSt - HackersOnlineClub
  • Charfeddine Hamdi - Tunisian Whitehat Security
  • David Hoyt - Hoyt LLC Research
  • Darius Petrescu
  • Francisco Correa
  • Frans Rosén - Detectify
  • Gineesh George
  • GHORAB Mostafa Anouar
  • Joel Melegrito
  • Jack "fin1te" Whitton - Include Security
  • Jay Turla
  • K0r3ph1l - Invalid Web Security
  • Koutrouss Naddara
  • Lion Nagenrauft
  • Max Prietzel
  • Mars(searphine) - GrayHat Internal of China (CnGrayHat)
  • Mo'menBasel
  • Missoum SAID
  • Mariano Di Martino
  • Madhu Akula
  • Mahmoud El Manzalawy
  • Med Amine Khelifi - Tunisia WhiteHat Security
  • Nikhil Srivastava
  • Neelesh Swami
  • Nicholas Lemonias - Advanced Information Security Corporation
  • Prasant Sharma
  • Rafael Pablos
  • Stephen Sclafani
  • SwissPirate - Dogesec
  • Thomas Rennhofer
  • Thomas Guittonneau
  • Yunusov Timur - Positive Technologies

November 2014 Security Researchers

  • Michael Gottburg
  • Omar Azouggarh
  • Abdul Wasay
  • Exismedia.com
  • Minhal Mehdi
  • Devil's Cafe
  • Babar Khan Akhunzada
  • Rafael Pablos
  • Tianqi Zhang
  • VulBox Security Team
  • Caner Koroglu
  • Symturk
  • Neelesh Swami
  • Max Prietzel
  • Adi Ivascu
  • Mathias Karlsson
  • Hackan
  • Venugopal Thotakura
  • J.M.Gazzaly
  • Loops Solutions
  • Clifford Trigo
  • Darius Petrescu
  • Nitesh Kumar Shilpkar
  • Tanuj Jane
  • Juan Sacco
  • Exploit Pack
  • Noah Wilcox
  • Sahil Saif
  • Jakub Żoczek
  • Frans Rosén
  • Detectify
  • Giorgi Javakhidze
  • Noriaki Iwasaki
  • Anand Sundar Tiwari
  • Eslam Medhat Ezzat
  • Ravindra Singh Rathore
  • AKS IT Services
  • Arvind Singh Shekhawat
  • AKS IT Services
  • Sergey Markov
  • Karthickumar.k & Shahidyan.C (Ramanathapuram)
  • Anshul Jain
  • AKS IT Services
  • Josef Frid
  • Ismail Kaleem
  • Evolution Security
  • Stephen Sclafani
  • Manolache Silviu
  • Ahmed Jerbi(Web Plus)
  • Mariano Di Martino
  • Mar Adrian Belen
  • John Koerner
  • Synack
  • SimranJeet Singh
  • Amit giri
  • Mahmoud El Manzalawy
  • Koutrouss Naddara
  • Constantine Giannopoulos
  • Daniel Cohen
  • Speednet Ltd
  • Amit Gandhi
  • Dharamvir Bisht
  • Gerasimos Panou
  • BughunterGR
  • J@lil K@mel
  • TeaM FireXploit
  • Hamza Bettache
  • Alexandre Pessoa
  • Paulos Yibelo
  • Ahmed Reda El-Mahalawy
  • Sahil Sehgal
  • Peter Jaric
  • Muhammad Talha Khan
  • Muhammad Hassham Nagori
  • Abeer Banerjee
  • Adrian Ivascu
  • Milan Bohacek
  • Charles University in Prague

October 2014 Security Researchers

  • Bohr Med Abdelhadi
  • P3ntester
  • Hamza Bettache
  • Narendra Bhati
  • R00t Sh3ll
  • Mohammed Abdulqader Abobaker Al-saggaf (Bin Ahmed)
  • Nicholas R. Clouston
  • Ayoub Fathi
  • W4nterr!0r
  • Patrik Fehrenbach
  • IT-Securityguard
  • Ali Hassan Ghori
  • AHPT
  • Manuel Herrera
  • Fida Hussain
  • Adi Ivascu
  • Lotfi Karaoui
  • Eric Lawrence
  • 李欢(Leesec)
  • André Luiz Pavão Lima
  • Osama Mahmood
  • Koutrouss Naddara
  • Lion Nagenrauft
  • Rafael Pablos
  • M.Asim Shahzad
  • Dhruva Sharma
  • Aniket Pratap Singh
  • Sky_BlaCk
  • TeaM FireXploit
  • Neelesh Swami
  • Anant S. Tiwari
  • Abderrazak YS

September 2014 Security Researchers

  • Yassine ABOUKIR
  • Ali Ahmed & Owais Ahmed Siddiqui
  • Mohammed Fayez Albanna
  • Cláudio André - Integrity S.A
  • Mirza Burhan Baig - BurhanBaig InfoSec!
  • Salem Faisal Elmrayed
  • Eslam Medhat Ezzat
  • Christian Galeone & HaMa BeSt
  • Fady S. Ghatas - TiTrias
  • Mazen Gamal Mesbah
  • Andrei Neculaesei
  • Sahad NK
  • Doron Peretz - Cyber Spear (BugSec Group)
  • Jaymark Pestaño - Invalid Web Security
  • Satheesh Raj
  • Muhammad Shahmeer - Maads Security
  • Siddharth Solanki - Hack For Security
  • Abdul Wasay - Exismedia.com

August 2014 Security Researchers

  • Asante Babers
  • Amol Dattatray Baikar
  • Robert Bengtsson
  • Mantissa
  • Rohan Birtia
  • anewzon.com
  • Sky_BlaCk
  • Team G410
  • Morgan Marquis-Boire
  • First Look Media
  • Juan David Castro Cantillo
  • WebSecurityDev
  • Marco Cazzaniga
  • Salman Khan Champion
  • Dicu Darius
  • Eslam Medhat Ezzat
  • Fooying
  • Knownsec
  • Apoorv Joshi
  • Rodolfo Godalle, Jr.
  • Surya Kumar
  • Christian Galeone & Yvann LeFay
  • Mark J. Lucas
  • California Institute of Technology
  • Minhal Mehdi
  • Simone Memolo
  • Mazen Gamal Mesbah
  • Mohammed Nassar
  • Pavan Kumar Palle
  • Vishnu Patel
  • Ravindra Singh Rathore
  • Torrid Networks
  • Prince Rawat
  • Euan Richardson
  • Sangeetha Rajesh S
  • Dushyant Sahu
  • Rishiraj Sharma
  • GirishKumar Shrimali
  • Net Square solutions pvt ltd.
  • Arvind Singh
  • Rahul Pratap Singh
  • Jasminder Pal Singh [Z-G]
  • Matt Tait
  • NCC Group
  • Provensec Labs Team
  • Provensec
  • Venkateswara Reddy Yaruva
  • IBOURK EL IDRISSI Yassine

July 2014 Security Researchers

  • Aditya Agrawal
  • Yasser Ali, Mohamed Abdelbaset
  • W3Pwn Security Team
  • Osama Ansari
  • AppCheck Team
  • AppCheck NG
  • Hesam Bazvand
  • Tahoora Co.
  • Gopal Bisht
  • ACSG Corporate
  • Saurabh Bodhe
  • Bitcomsec
  • Bitcoin Community Security
  • Jerold Camacho
  • Vikas Chopalli
  • Louis-Paul Dareau
  • Söùkaina ErràchDï
  • Interested in web security
  • Christian Galeone
  • ITCL Marco Polo - Bari
  • Rodolfo Godalle, Jr.
  • Mario Gomes
  • Ragini Gupta
  • Mousab Elhag Hassan
  • Jitendra Jaiswal
  • Peter Jaric
  • Osanda Malith Jayathissa
  • Ranjan Kathuria
  • André N. Klingsheim
  • Denisov Denis KPEBETKA
  • Ayoub Nait Lamine
  • Technawi
  • Eric Lawrence
  • Yu-Cheng Lin
  • AndroBugs.com
  • Haider Mahmood
  • Amine Marzouki
  • Atul Mehta
  • Joel Melegrito
  • Mazen Gamal Mesbah
  • Shahee Mirza
  • Koutrouss Naddara
  • Gary O'Leary-Steele
  • Appcheck NG
  • Ch. Muhammad Osama,Behroz Nathwani
  • Jaymark Pestaño - Invalid Web Security
  • Eduardo Prado - Beyond Security's SecuriTeam Secure Disclosure Program
  • Satheesh Raj and Koutrouss Naddara
  • Security Researchers
  • Sangeetha Rajesh S
  • Lalith Rallabhandi
  • Premdhar Rao
  • Prince Rawat
  • Gurjant Singh and Mayank Kapoor
  • Roman Shafigullin
  • Sky_BlaCk
  • Team G410
  • Koki Takahashi
  • Dipen Thakkar
  • Shaikh Jamal Uddin
  • Secure Coat
  • Srikanth Yandava

June 2014 Security Researchers

  • Colțuneac Alexandru
  • Yasser Ali
  • W3Pwn
  • Daniel Alvear (MaztoR)
  • MD Azaruddin
  • Paul Biteng
  • Mirza Burhan Baig
  • BurhanBaig InfoSec!
  • Jerold Camacho
  • Vikas Ch
  • Deepanker Chawla
  • Vikas Chopalli
  • Adel EJJAMAI
  • Seif Elsallamy
  • Anurag Giri
  • Holy Mary Institute of Technology
  • Rodolfo Godalle
  • Alexandre Herzog
  • Omer Iqbal
  • Adi Ivascu
  • Tanuj Jane
  • Peter Jaric
  • Abhibandu Kafle
  • Entrust Solutions, Nepal
  • Mohamed Khaled
  • Giuseppe Leonardi
  • Sean Li
  • DropBox
  • Yu-Cheng Lin
  • AndroBugs.com
  • Filippos Mastrogiannis
  • Ciaran McNallly
  • Joel Melegrito
  • Simone Memoli
  • Mazen Gamal Mesbah
  • Yogesh Modi
  • SecurityEscape
  • Deepak kumar Nath
  • Rafael Pablos
  • Jinen Patel
  • Paras Pilani
  • José Pino
  • Lalith Rallabhandi
  • Nadjib Rebahi
  • SupDesk
  • Giampaolo Ricchiuti
  • Monendra Sahu
  • Hardik Tailor
  • Yuji Tounai
  • Robert Verderame
  • Abdul Wasay
  • Dr.FarFar
  • Th3 Prince oF Egypt

May 2014 Security Researchers

  • Bohr Mohamed Abdelhadi
  • Abdullah Alomair
  • Security Overflow
  • Osama Ansari
  • Deepak Kumar Nath, MD Azharuddin
  • Sky_BlaCk
  • Team G410
  • Sujoy Chakravarti
  • hackerDesk
  • Tushar Dalvi
  • Divakar
  • Abdullah Ahmet Erdem
  • Eslam Medhat Ezzat
  • Sergio Galán
  • Christian Galeone
  • ITCL Marco Polo - Bari
  • Mario Gomes
  • Ebrahim Hegazy
  • Q_CERT
  • Jordan Jones, Joe Hatoum
  • Noriaki Iwasaki
  • Jitendra Jaiswal
  • Wang Jing
  • Shyam Jordan
  • Hicube Infosec Pvt.Ltd.
  • Stefan Kanthak
  • Arul Kumar
  • Rick Geex (Mischa Rick van Geelen), Merijn Kruithof
  • WhiteSec
  • Dmitry Kulshitsky
  • Ashish Kumar
  • Yu-Cheng Lin
  • AndroBugs
  • Nick Lowe
  • Luga Technology Ltd.
  • Danijel Maksimovic
  • Simone Memoli, Filippos Mastrogiannis
  • Italian Security Team
  • Mazen Gamal Mesbah
  • Yogesh Modi
  • SecurityEscape.com
  • Farhan Munshi
  • Indrajith.A.N
  • Koutrouss Naddara
  • Mohammed Nassar
  • Carlos Pereira
  • Jack in @ Box IT
  • Lalith Rallabhandi
  • Nadjib Rebahi
  • Mikko Saario
  • HERE, a Nokia company
  • Behrouz Sadeghipour
  • Priyanshu Sahay
  • Hackers Online Club
  • Andrew Sampson
  • Muhammad Sarmad Shafiq
  • Hammad Shamsi
  • Himanshu Sharma
  • Rishiraj Sharma
  • SecurityEscape.com
  • GirishKumar Shrimali
  • Net-Square
  • SimranJeet Singh
  • Mohamed Hassan Soliman
  • Ahmed Sultan
  • Security Arrays
  • Tony Trummer
  • S.Venkatesh
  • Robert Verderame
  • Sajal Verma
  • IBOURK EL IDRISSI Yassine

April 2014 Security Researchers

  • Ahmed Aboul-Ela
  • Starware
  • Teguh P. Alko
  • Seth Art
  • Blue Canopy Group, LLC
  • Deep Asnani
  • Mikko Carreon
  • Ashishkumar B. Dhaduk
  • Florindarck
  • Romanian Security Team
  • Mohamed M.Fouad
  • Germán Sánchez Garcés
  • ElevenPaths
  • Abdullah Hussam Gazi
  • Djamel Eddin Hakim Ghorab
  • HusseiN98D
  • AnonGhost
  • Osanda Malith Jayathissa
  • WANG Jing
  • Krishna Chaitanya Kadaba
  • Cigniti
  • Sandeep Kamble
  • Gazon Communication
  • Prayas Kulshrestha
  • Reed Loden
  • Almas Malik
  • Hacking Sec
  • Joy Mastropietro, Brian Duffy
  • NYS Office of Information Technology Services
  • Carl Mehner
  • Simone Memoli
  • MD Mihir Mistry
  • Koutrouss Naddara
  • Badr High School
  • Hronak Nahar
  • Saurabh Chandrakant Nemade
  • Gary O'Leary-Steele
  • Sec-1 Ltd
  • Alfredo Pironti
  • Shelesh Rauthan
  • Abattis Consulting Pvt. Ltd
  • Monendra Sahu
  • Muhammad Shahmeer
  • Maads Security (Usman Institute of Technology)
  • Kartik Sharma
  • Shikhil Sharma, Ananda Krishna
  • Czar Securities
  • Farrukh Sheraz
  • Sky_BlaCk
  • Team G410
  • Ben Smyth
  • TAS
  • Anand Sundar Tiwari
  • Srikanth Yandava

March 2014 Security Researchers

  • Bohr Med Abdelhadi
  • Ehraz Ahmed and Umraz Ahmed
  • Malte Batram
  • Bo0oM
  • OnSec
  • Jerold Camacho
  • Dr.FarFar
  • Egyptian Shell Team
  • Christian Galeone
  • Germán Sánchez Garcés
  • Rodolfo Godalle, Jr.
  • Mario Gomes
  • Gökmen GÜREŞÇİ
  • Oren Hafif
  • Trustwave SpiderLabs
  • Kristoffer Wilhelm von Hassel
  • David Hoyt
  • Hoyt LLC
  • Adeel Imtiaz
  • Osanda Malith Jayathissa
  • Aditya Jhankal
  • Muhammad Talha Khan
  • Simone Memoli
  • Δημήτρης Μίχος
  • Koutrouss Naddara
  • Badr High School
  • Nishant Nichani
  • Darius Petrescu
  • George Purdy-Say
  • Lalith R
  • Shubham Raj
  • Behrouz Sadeghipour
  • Peter Schmitz
  • xlimbolandx
  • Muhammad Shahzad
  • Hammad Shamsi
  • Shikhil Sharma, Vinit Varghese
  • Czar Securities
  • Dibyendu Sikdar
  • Bojan Simic
  • Dan Singerman
  • Reason Factory
  • Sandeep Singh
  • HackerDesk
  • Sky_Black
  • Team G410
  • Tony Trummer, Tushar Dalvi
  • Jayson Zabate
  • Rebiai Ali Zinédine

February 2014 Security Researchers

  • Tayyab Abdullah
  • Aitchison College
  • Daniel Alvear
  • Luke Anderson
  • Malte Batram
  • Anand Bhat
  • Jacek Bylina, Hubert Chylik
  • Dhaval Chauhan
  • Artur Czyż
  • s3curity
  • Pobereznicenco Dan
  • RstForums
  • Rishal Dwivedi, Manjot Singh
  • EH-Sec
  • El Hadjeui Jamal Eddine
  • Florindarck
  • Romanian Security Team
  • Suhas Gaikwad
  • Ali Hasan Ghauri
  • AHPT
  • Scott Glossop
  • RandomStorm
  • Rodolfo Godalle, Jr.
  • Irfad Imtiaz, Saqib Kamran
  • Jitendra Jaiswal
  • Simone Memoli
  • Sherin Panikar
  • KeralaCyberSquad-India
  • Vitaly Pankevich
  • Nirmal Pattara, Siddhesh Gawde
  • Shubham Raj
  • Matthias Ritscher, Emmanuel Stapf
  • Fraunhofer SIT, Testlab Mobile
  • Mohamed Osman Saeed
  • Sahil Saif
  • security ghost team
  • Aleksa Sarai
  • Kamil Sevi
  • Tarek Siddiki
  • Ketan Sirigiri
  • Cigniti Technologies Ltd.
  • Sky_BlaCk
  • Team G410
  • James Slater
  • Danish Tariq, Noman Ramzan
  • Lukas Tribus

January 2014 Security Researchers

  • Ankit Bharathan
  • Anand Bhat
  • Bo0oM (@i_bo0oM) - OnSec
  • Dhaval Chauhan
  • Mike Czumak
  • Tianfang Guo, Allan Zhang
  • Trustlook Inc
  • Gökmen GÜREŞÇİ
  • David Hoyt - Hoyt LLC
  • Prashant Kumar
  • Shubham Mittal
  • Koutrouss Naddara - Badr High School
  • Praveen Nair - Kerala Cyber Squad
  • Hanh H. Nguyen
  • Ibrahim Raafat - Q-CERT
  • Issam Rabhi
  • Evan Ricafort
  • Stefan Schurtz
  • GirishKumar Shrimali - Net-Square Solutions Pvt. Ltd
  • Bojan Simic
  • SimranJeet Singh

December 2013 Security Researchers

  • Taufiq Ali (@p0wnsauc3)
  • NII Consulting
  • Andris Atteka
  • Courland Consulting
  • Ramil "ram600" Aysin
  • Ninad Bhamburdekar
  • Alan Byrne
  • Cogmotive
  • Osman doğan
  • Abdullah Hussam Gazi
  • Yosuke HASEGAWA
  • Netagent Co.,Ltd.
  • David Hoyt
  • Hoyt LLC
  • David Hoyt
  • Hoyt LLC
  • David Hoyt
  • Hoyt LLC
  • David Hoyt
  • Hoyt LLC
  • Joyce Joseph
  • Maximilian Jung
  • Elar Lang,Jaanus Kääp
  • Clarified Security OÜ
  • Ateeq ur Rehman Khan
  • Nicholas Lemonias
  • Information Security Expert, Advanced Information Security Corp.
  • Benjamin Kunz Mejri
  • Koutrouss Naddara
  • Independent Security Researcher
  • Bhavesh Naik
  • Ashish Rai
  • Colvin Taluqdars' College, Lucknow
  • Shubham Raj
  • OpenFire Technologies
  • Jacob Soo Lead Re
  • Shivam Saluja (Technopope)
  • Team LnXr00t
  • Kamil Sevi
  • P.B.Surya.Subhash
  • Jigar Thakkar (Akhani)
  • InfobitTechnologies
  • Veli-Pekka Vainio
  • Nenad Vijatov
  • Yasir Altaf Zargar

November 2013 Security Researchers

  • Carlo Soliveres Benedicto (Fierce)
  • Simon Claudiu # DirtyCash
  • rstforums.com
  • Ravi chandroliya
  • S. R. Institute of Mngt and Computer Application
  • Vivek Chauhan
  • Jakub Galczyk
  • Faisal Ait Hamou
  • WAQEEH UL HASAN
  • AHPT Backlink
  • David Hoyt
  • Hoyt LLC
  • David Hoyt
  • Hoyt LLC
  • Rakesh kumar
  • Shpend Kurtishaj
  • Darts Security
  • Patryk M
  • Koutrouss Naddara
  • Security adviser at Alwatanvoice Website
  • Rafael Pablos
  • Tejash Patel
  • Ajinkya Patil
  • Darius Petrescu
  • Vinesh N. Redkar
  • NII Consulting
  • Vinesh Redkar,Ajinkya Patil
  • GirishKumar Shrimali
  • Net-Square Solutions Pvt Ltd
  • Rishal Dwivedi & Manjot Singh
  • EH-Sec InfoTech
  • Gurjant Singh, Mayank Kapoor
  • HackerDesk
  • Rahul Singh, Devjeet Singh, Ashish Goyal
  • RMAR technologies Pvt. Ltd

October 2013 Security Researchers

  • Bülent Albayraksaran
  • BTOS
  • Coltuneac Alexandru
  • Teguh P. Alko
  • Samar Alshikh
  • Zakaria Amous
  • Nikhalesh singh bhadoria
  • Amitay Dan (popshark1)
  • Osman doğan
  • Christopher Emerson
  • White Oak Security
  • Siddhesh Gawde
  • zakaria el alaoui ghafsai
  • Gjon Gojcevic
  • Mario Gomes
  • Luis Grangeia
  • SysValue
  • Bahman Hayat
  • Stavan Karia
  • Haider Mahmood
  • SecurityUndefined
  • Shahee Mirza
  • Koutrouss Naddara
  • Badr High school
  • Ravikumar Paghdal
  • S.R. Institute of Mngt and Computer Application
  • Tejash Patel
  • Shubham Raj
  • OpenFire Technologies
  • Noman Ramzan & Danish Tariq
  • MylatestTricks
  • Shikhil Sharma
  • Czar Securities
  • Jayvardhan Singh
  • Shagun Singh
  • David Sopas
  • Connor Spicer
  • Jay Turla
  • Sachin Yadav (Rusty)
  • Synapse Corp

September 2013 Security Researchers

  • Munteanu Alexndru
  • Security Leaks
  • Mirza Burhan Baig
  • BlacKBitZ
  • Ankit Bharathan
  • David Chan
  • Raghavendra Karthik D
  • Pobereznicenco Dan(danyweb09)
  • Isaac Dawson
  • Veracode, Inc.
  • Rishal Dwivedi and Manjot Singh
  • Bhavan's Vivekananda College, Rimt College Mandi Gobindgarh
  • Gineesh George
  • Souhail Hammou (Dark-Puzzle)
  • ITSecurity
  • John Hernandez
  • Casaba Security LLC
  • Max Justicz
  • Ismail Kaleem
  • Vulnerability-Lab
  • James Manger
  • Telstra
  • Shahee Mirza
  • Sebastian Neef
  • Internetwache.org
  • Ajay Singh Negi and Prashant Negi
  • Web Application Security Research
  • Salma Noreen
  • Md Zubaid Ali Nouman
  • Alex Ozkan
  • Ibrahim Raafat
  • Starware
  • Shubham Raj
  • OpenFire Technologies
  • Shubham Raj
  • Darji Maheshkumar Rajubhai
  • S.R Institute of Mngt and Computer Application
  • Daniel Díez Tainta
  • Yuji Tounai

August 2013 Security Researchers

  • Ahmad Ashraff
  • Ankit Bharathan
  • Malte Batram
  • Rafay Baloch
  • Dhaval Chauhan
  • Brendan Curry
  • Olivier Dagenais
  • Software Ninjas
  • Thamatam Deepak
  • N&D Corporation
  • Osman Doğan (@osmand0gan)
  • Abhijeth Dugginapeddi
  • Ahmed Mohamed Hassan Aboul-Ela
  • Starware
  • Florindarck
  • Romanian Security Team
  • Gökmen GÜREŞÇİ
  • Peter Hendrix
  • Irfad Imtiaz
  • Osanda Malith Jayathissa
  • Pradeep Jairamani
  • Varun Kakumani
  • Saqib Kamran
  • Moritz Kaumanns
  • Aamir khan
  • Hacking Articles
  • Dmitry Kulshitsky
  • TP Technology security team
  • Tushar Kumbhare
  • Nicholas Lemonias
  • Information Security Expert, Advanced Information Security Corp.
  • Piyush Malik (@ThePiyushMalik) and Amar Shankar
  • Acharya Institute, Bangalore
  • Yogesh Modi
  • Sebastian Neef
  • Ajay Singh Negi and Prashant Negi
  • Web Application Security Research
  • Nutan kumar panda
  • Le Phuoc Phuc.
  • Globeteam A/S
  • Issam Rabhi
  • Kamil Sevi
  • Himanshu Sharma
  • David Sopas
  • Daniel Díez Tainta (@DaniLabs)
  • Jay Turla
  • Ahmed Waheed
  • DefenseON
  • Muhammad Waqar(@MuhammadWaqar_9)
  • Taimoor Zaffar
  • July 2013 Security Researchers
  • Ehraz Ahmed
  • Umraz Ahmed
  • Aditya K Sood and Rohit Bansal
  • Security Researcher, SecNiche Security Labs
  • Imen Essoussi
  • Gökmen GÜREŞÇİ
  • Ashar Javed
  • Rajat Karmarkar (Indishell ICA hacking crew)
  • Daniel Kelley/Vaibs
  • Ateeq Khan
  • Vulnerability Laboratory
  • Waleed Khan
  • Timo Lins
  • Shahee Mirza
  • Rafael Pablos
  • RaviKumar Paghdal
  • S. R. Institute of Mngt and Computer Application
  • Nutan Kumar Panda
  • Joël Pimenta
  • Prakhar Prasad
  • Kacper Rybczyński
  • Devil team
  • Ibrahim Raafat
  • Starware
  • Issam Rabhi
  • Shubham Raj
  • Sandeep Singh Rehal
  • Muhammad A.S.
  • Muhammad Ahmed Siddiqui
  • Richard Suarez
  • Pobereznicenco Dan (danyweb09) and VaDSunete
  • rstforums.com
  • Nathaniel Wakelam
  • Yoni Ramon
  • 2Bsecure Ltd

June 2013 Security Researchers

  • Munteanu Alexandru (ak4d3a)
  • Cyber Security Research Center from Romania (CCSIR)
  • Deepankar Arora
  • Damien Bancal
  • Olivier Beg
  • Sergey Bobrov
  • Positive Technologies
  • Charlie Briggs
  • Juan D. Castro
  • WebSecurityDev
  • Dhaval Chauhan
  • Mike Czumak
  • Camilo Galdos AkA Dedalo
  • SeguridadBlanca
  • Rogier F.
  • Gabriel Gavilán
  • Ali Hasan Ghauri
  • AHPT
  • Dawid Golak
  • Yosuke Hasegawa
  • NetAgent Co.,Ltd.
  • hate.me
  • RST
  • Wan Ikram
  • Nipun Jaswal
  • Ashar Javed
  • Mathias Karlsson
  • Detectify
  • Nicholas Knight
  • OpenWire Security
  • Dmitry Kulshitsky
  • Shpend Kurtishaj
  • Christian Lopez Martin
  • insertcoin
  • Danijel Maksimović
  • Piyush Malik
  • Anđelko Nikolić
  • Prakhar Prasad
  • Security Pulse
  • E. Sanchez
  • Danalachi Sergiu
  • Marc Schoenefeld
  • Nikhil Srivastava
  • Techdefence Pvt. Ltd.
  • r00tme
  • Sunny Vaghela
  • Techdefence Pvt. Ltd.
  • Veli-Pekka Vainio
  • Deepanker Verma
  • HackingTricks
  • Kévin Valentin Vigerie
  • Priyal Viroja
  • Shashank(@cyberboyIndia)

May 2013 Security Researchers

  • 7dscan
  • 7D Security
  • Julien Ahrens
  • Inshell Security
  • Emrullah Akdemir
  • Ahmad Ashraff
  • Aditya Balapure
  • Rafay Baloch
  • RHA
  • Damien Bancal
  • Malte Batram
  • Michael Chanata
  • Dhaval Chauhan
  • DAV Public School Gandhinagar
  • Christopher Emerson
  • White Oak Security
  • Evgeny Ermakov
  • florindarck
  • Hackyard Security Group
  • Yosuke Hasegawa
  • NetAgent Co.,Ltd.
  • Zackary Hearn
  • Yogesh Jaygadkar
  • Mathias Karlsson
  • Detectify
  • Omary Lhoussine
  • École nationale supérieure d'informatique et d'analyse des systèmes
  • Ahmed Osman
  • Prakhar Prasad
  • Security Pulse
  • Sukali Raj
  • Defencely
  • Nilesh Rathod
  • SimranJeet Singh
  • Raj Sukali
  • Defencely
  • Vedachala
  • Xtremegeekz
  • Vindhyachala
  • Xtremegeekz

April 2013 Security Researchers

  • Hazim Aslam
  • White Hat Dude
  • Malte Batram
  • Bogdan Sergiu Dragoș
  • Cyber Security Research Center from Romania (CCSIR)
  • Imen Essoussi
  • Trevor Frewin
  • Cogent Healthcare Systems LTD
  • Joe St. Germain
  • Albino Studios
  • Steven Hales
  • Yosuke Hasegawa
  • NetAgent Co.,Ltd.
  • Omary lhoussine
  • Yogesh Jaygadkar
  • Indivudual
  • Jon
  • Bitquark Security Research
  • Saqib Kamran
  • Abhinav Karnawat
  • \/ w4rri0r \/
  • Никола Којић (Nikola Kojic)
  • Network Security Solutions
  • Robert Kugler
  • Dmitry Kulshitsky
  • Carter Leland (Mr.Cube)
  • Danijel Maksimović (Brčko - Bosnia)
  • Ajay Singh Negi
  • iViZ Security
  • Prashant Negi
  • iViZ Security
  • Saurabh Chandrakant Nemade
  • Issam Rabhi
  • Ritesh Arunkumar Sarvaiya
  • Defencely
  • Kamil Sevi
  • Atulkumar Hariba Shedage
  • Defencely
  • Ben Sheppard
  • Raj Sukali
  • Indishell and MCA
  • Suved
  • Krishna Teja
  • VNR Vignana Jyothi Institute
  • Muhammad Waqar
  • Blackbitz

March 2013 Security Researchers

  • Abdullah Alomair
  • Laith AL-Satari
  • Darshit Ashara
  • Nullcon Jailbreak
  • Mirza Burhan Baig
  • BlackBitz
  • Damien Bancal
  • Malte Batram
  • Carlo Soliveres Benedicto (Fierce)
  • Mayur Bhandare
  • Marathi Cyber Army
  • Ankit Bharathan
  • Lonely-hacker
  • Harsha Vardhan Boppana
  • Anirudh Duggal
  • Nullcon Jailbreak
  • Christopher Emerson
  • White Oak Security
  • Siddhesh Gawde
  • Nir.Goldshlager
  • Zeeshan Haider
  • Jann Horn
  • David Hoyt
  • Hoyt LLC
  • Omary lhoussine
  • Aman Kharbanda
  • Jimmy Lemelin
  • Monendra Sahu
  • Indishell
  • Jasminder Pal Singh
  • Zero-Guy Scripts
  • Jatinpreet Singh
  • Ajit Karam Singh International Public School
  • David Sopas
  • P.B.Surya.Subhash
  • Resister India
  • Raj Sukali
  • Luka Al Tabbaa
  • Lukas Tribus

February 2013 Security Researchers

  • Tayyab Abdullah
  • Aitchison College, Lahore
  • Ahmad Ashraff
  • Malte Batram
  • Kislay Bhardwaj
  • The Hacker News
  • Sergiu Dragos Bogdan
  • Emanuel Bronshtein
  • Brad C
  • Evgeny Ermakov
  • Positive Technologies
  • Camilo Galdos AkA Dedalo
  • SeguridadBlanca
  • Mauro Gentile
  • Yosuke Hasegawa
  • NetAgent Co.,Ltd.
  • David Hoyt
  • Hoyt LLC
  • Wan Ikram
  • Ashar Javed
  • Yuji Kosuga
  • Mr. Nicholas Lemonias
  • Advanced Information Security Corp
  • Christy Philip Mathew
  • Offcon Info Security
  • Benjamin Kunz Mejri
  • Vulnerability Laboratory
  • Frans Rosén
  • detectify
  • Sabari Selvan
  • E Hacking News
  • Ilyas Sharif
  • Shashank
  • Reginaldo Silva
  • Ubercomp
  • Raj Sukali
  • superhei
  • Shubham Upadhyay
  • Daniel Urban
  • Jacob Watts (Jamaicob)
  • HackinUS
  • Vishnu M William
  • Biro Zeno

January 2013 Security Researchers

  • Munteanu Alexandru (ak4d3a)
  • RST
  • Brandon Alderson
  • Satish B
  • Malte Batram
  • Bilal (ZentrixPlus)
  • ZentrixPlus
  • Christopher Emerson
  • White Oak Security
  • Siddhesh Gawde
  • Mohammad Ghasembeigi
  • ArticleVoid
  • Amit Ghope
  • Steven Hales
  • Souhail Hammou (Dark-Puzzle)
  • Waqeeh Ul Hasan (AHPT)
  • AHPT
  • Jake Hobman
  • R.Milad Hosseni
  • Pratik KC (phybeя)
  • Phyber Security
  • Benedykt Kościński
  • Yuji Kosuga
  • Anakorn Kyavatanakij
  • Per Mathiesen
  • Benjamin Kunz Mejri
  • Vulnerability Research Lab
  • Saurabh Chandrakant Nemade
  • Francis Alexander Pattara (torque59)
  • Amal Jyothi College of Engineering Company
  • Mohamed Ramadan
  • Attack-Secure
  • Jacob Soo
  • Marian Ventuneac
  • Deepanker Verma
  • Hacking Tricks
  • Muhammad Waqar
  • BlackBitz

December 2012 Security Researchers

  • Chokri Ben Achour
  • www.vulnerability-lab.com
  • Imtiaze Ashik (νιятυαℓнα¢кєя)
  • The L33ts
  • Ahmad Ashraff
  • Bilal (ZentrixPlus)
  • ZentrixPlus
  • Meir Bank
  • Meir Bank Web Development
  • Rajit Bansal
  • Regional Institute of Management & Technology, India
  • Frederic Baudoin
  • Crimson Hosting
  • Mattia Bevilacqua
  • Manish Bhattacharya (introvert mac)
  • Thamatam Deepak
  • Jeremy Dilliplane
  • Nikhil Dubey
  • Ramdeobaba College of Engineering and Management
  • Griffin Francis
  • John Paul College, NSW, Australia
  • Siddhesh Gawde
  • Mauro Gentile
  • Spencer Harvey
  • MediaBuzzed LLC
  • Yosuke Hasegawa
  • NetAgent Co.,Ltd.
  • Asher Hendel
  • David Hoyt
  • Hoyt LLC
  • Ankit Jaitly (iCodeDTech)
  • Mohammad Shuaib Jewon
  • Aniket Kambli
  • Vaibhav Khatke
  • James Koole
  • Nikhil P. Kulkarni
  • Prajal Kulkarni
  • M.R.Vignesh Kumar
  • Galen K. Lansbury
  • St. Pauls School
  • Mayur Lohite
  • Benjamin Kunz Mejri
  • Vulnerability Laboratory
  • Anand Meyyappan
  • Ruby Nealon (rubymeow)
  • Ruchiit Patel
  • Sagar Ramesh Pawar
  • Team Indishell
  • Bushapaka Rajesh
  • MVSR Engineering College
  • D.V.Sudhir raju
  • Noman Ramzan
  • RHA
  • Miloš Romić
  • Frans Rosén
  • detectify
  • Sai Satish
  • Indian Servers
  • Roman Shafigullin
  • LinkedIn
  • Himanshu Sharma (нα¢кєя)
  • Jasminder Pal Singh
  • Zero-Guy Scripts
  • David Tran
  • Rashmil Tyagi
  • Stark Cyber
  • Daniel Urban
  • Jacob Watts (Jamaicob)
  • HackinUS
  • Marcel Wieck
  • Matthew Wong
  • Spotflux
  • Mahmut Esat Yildirim

November 2012 Security Researchers

  • Pulkit Agarwal
  • Dom L. Arzon
  • Tim Bach
  • Salesforce.com
  • Mirza Burhan Baig
  • BlackBitz
  • b2aller
  • Rafay Baloch
  • RHA
  • Abhay Bhanot
  • Michael Blake
  • Harsha Vardhan Boppana
  • Login Security Solutions (p) Limited
  • Inti De Ceukelaire
  • Thamatam Deepak (Mr.47™)
  • Chiragh Dewan
  • Pal Technologies
  • Bogdan Sergiu Dragoş
  • Bogdan Sergiu Dragoș
  • Drăgan European University
  • Rishal Dwivedi
  • Hacking – sec
  • John Eidum (Ayzhin)
  • Tooraj Esmailian
  • Linesec
  • Anthony Fernandez
  • Griffin Francis
  • John Paul College, NSW, Australia
  • Vedran Franges
  • extreme IT
  • Victor Gatto
  • Siddhesh Gawde
  • Dilhan Geeth
  • Mirovola
  • Elvin Hayes Gentiles (elvinguitar)
  • Technological University of the Philippines
  • Ucha Gobejishvili (საქართველო)
  • Dylan S. Hailey
  • Mohamad Hallak
  • Ebrahim Hegazy
  • Starware
  • David Hoyt
  • Hoyt LLC
  • Ashar Javed
  • Daniel K (ραяαdοχυn)
  • Para Solutions
  • Pratik KC (phybeя)
  • Phyber Security
  • Moritz Kaumanns
  • Yuji Kosuga
  • Dmitry Kulshitsky
  • Tushar Kumbhare
  • Anti Hacking Anticipation Society (HANS)
  • Mayur Lohite
  • Techdeviners
  • Nicolas Mattiocco
  • Alexander Metrocavich
  • Anand Meyyappan
  • Aarshit Mittal (Indishell)
  • Abes Engineering College, India
  • Zain Qaiser
  • Harikrishnan.R
  • Josh Roston
  • Alok Saurabh
  • Logica, now a part of CGI
  • Roman Shafigullin
  • LinkedIn
  • Natalia Shafigullina
  • Himanshu Sharma (нα¢кєя)
  • FileIce LLC
  • Vaibhuv Sharma
  • Vansh Sharma
  • Shashank(@cyberboy)
  • krutarth Shukla
  • Manjot Singh
  • Hacking – sec
  • Matthew Sweeney
  • Sween's Internet Security
  • Kevin Tobin
  • Daniel Urban
  • Guifre Ruiz Utges
  • Buguroo Offensive Security
  • Sasank Vemuri

October 2012 Security Researchers

  • Mirza Burhan Baig
  • BlackBitz
  • Harkirat Bains
  • Rafay Baloch
  • RHA
  • Eusebiu Blindu
  • João Lucas Melo Brasio
  • White Hat Hackers Consultoria de Segurança da Informação LTDA (Brasil)
  • Fabián Cuchietti
  • A29LABS
  • Marcin Dudek
  • Griffin Francis
  • John Paul College, NSW, Australia
  • Gambit
  • Siddhesh Gawde
  • Dilhan Geeth
  • Mirovola
  • Mohammad Ghasembeigi
  • Ucha Gobejishvili (საქართველო)
  • Oliver Gruskovnjak
  • Portcullis, Inc.
  • Aditya Gupta
  • Subho Halder
  • Ebrahem Hegazy
  • Starware
  • David Hoyt
  • Hoyt LLC
  • Anubhuti Jain
  • Ashar Javed
  • Bradley Johnson
  • Ioannis Kapolos
  • FirstPlace
  • Vaibhav Khatke
  • Nikola Kojic
  • Yuji Kosuga
  • Dmitry Kulshitsky
  • Damien Lapham
  • Isac Marian
  • Ashish Puri
  • AIET-PTU
  • Alok Saurabh
  • Logica, now a part of CGI
  • Kamil Sevi
  • Himanshu Sharma (нα¢кєя)
  • FileIce LLC
  • Vaibhuv Sharma
  • Vansh Sharma

September 2012 Security Researchers

  • Satish B
  • Meir Bank
  • Oleg Berman
  • Emanuel Bronshtein
  • Joshua Coleman
  • Fabián Cuchietti
  • A29LABS
  • Thamatam Deepak (Mr.47™)
  • Tooraj Esmailian
  • Neyolov Evgeny
  • ERPScan
  • Dilhan Geeth
  • Mirovola
  • Yosuke Hasegawa
  • Ebrahim Hegazy
  • Starware
  • David Hoyt
  • Hoyt LLC
  • Ashar Javed
  • Nikola Kojic
  • Jinen Patel
  • Hicubes Infosec Ltd.
  • Nick Price (Rucas)
  • Goatse Security
  • Lukas Reschke
  • Mikko Saario
  • Nokia Corporation
  • Alok Saurabh
  • Logica
  • Shubham Shah
  • EPZSecurity
  • Abhilash Sharma
  • Himanshu Sharma (нα¢кєя)
  • Dronacharya College of Engineering – Student
  • Aditya K Sood
  • Department of Computer Science and Engineering, Michigan State University
  • Небојша Терзић (Nebojsa Terzic )
  • Matthew Wong
  • Spotflux

August 2012 Security Researchers

  • AISec.cn
  • Artificial Intelligence Security Co. Ltd.
  • Rafay Baloch
  • RHA
  • Rohit Bansal
  • Harsha Vardhan Boppana
  • João Lucas Melo Brasio
  • White Hat Hackers Consultoria de Segurança da Informação LTDA (Brasil)
  • Emanuel Bronshtein
  • Robert Fly
  • Salesforce.com
  • Avram Marius Gabriel
  • Mateusz Goik
  • AliantSoft
  • Mario Gomes
  • Keita Haga
  • Mohamad Hallak
  • Nicolas Ham
  • David Hoyt
  • Hoyt LLC
  • Ashar Javed
  • Jimmy_RST
  • Nils Juenemann
  • Masato Kinugawa
  • Nikola Kojic
  • Dmitry Kulshitsky
  • Ivan Markovic
  • Network Security Solutions
  • Jacob Soo Lead Re
  • Lukas Reschke
  • Ari Rubinstein
  • Salesforce.com
  • Mikko Saario
  • Nokia Corporation
  • Cerlyn Shepu
  • SimranJeet Singh
  • IndiShell
  • Aditya Sood
  • Michigan State University

July 2012 Security Researchers

  • Priyanka Arora
  • ASL IT Pvt Ltd
  • Meir Bank
  • Harsha Vardhan Boppana
  • Rishal Dwivedi
  • Dilhan Geeth
  • Mirovola
  • David Hoyt
  • Hoyt LLC
  • Anubhuti Jain
  • Ashar Javed
  • Aarshit Mittal
  • Er.Ashish Puri (Piyush Puri) आशीष पुरी (पीयूष पुरी)
  • Ari Rubinstein
  • Salesforce.com
  • Matthew Wong
  • Spotflux

June 2012 Security Researchers

  • Yasser Aboukir (ياسر أبوكير )
  • Damian Bancal
  • Mike Cardwell
  • Maier Cosmin
  • BackTrack Romania
  • Fabián Cuchietti
  • A29LABS
  • Gambit
  • Mario Gomes
  • Keita Haga
  • David Hoyt
  • Hoyt LLC
  • Ashar Javed
  • David Marcec (Kingo)
  • Nestor
  • Pratik KC (phybeя)
  • Phyber Security
  • Dmitry Kulshitsky
  • Lukas Reschke
  • Ari Rubinstein
  • Salesforce.com Product SecurityTeam
  • Abdeljalil S'hit ( عبد الجليل اسحيت )
  • Belmin Vehabovic

May 2012 Security Researchers

  • AIScanner
  • AISec.cn (Artificial Intelligence Security Pvt. Ltd)
  • Marc Jordana Carreras
  • Fabián Cuchietti
  • A29LABS
  • Igor Frangez
  • Dilhan Geeth
  • Mirovola
  • Ucha Gobejishvili (საქართველო)
  • Szymon Gruszecki
  • Ashar Javed
  • Yogesh Jaygadkar
  • Keita Haga
  • David Hoyt
  • Hoyt LLC
  • Pratik KC (phybeя)
  • Phyber Security
  • Vaibhav Khatke
  • Dmitry Kulshitsky
  • Paul Lepkowski
  • Rochester Institute of Technology (RIT)
  • Andrew Lyons, Drew Hintz for reporting a Outlook vulnerability (CVE-2012-2520)
  • Google Security Team, Google Inc.
  • RandomStorm Proactive Security Management
  • www.randomstorm.com
  • Lukas Reschke
  • Ari Rubenstein
  • Salesforce.com Product Security Team
  • Luis Santana
  • HackTalk Security Team
  • Himanshu Sharma (нα¢кєя)
  • FileIce LLC

April 2012 Security Researchers

  • Vasil Andonov
  • Elie Berstein
  • Isha Bhattacharya
  • Joao Lucas Melo Brasio
  • DotFive Labs Desenvolvimento de Softwares LTDA
  • Marco Cazzaniga
  • Fabián Cuchietti
  • A29LABS
  • Johannes Dahse
  • Elvin Hayes Gentiles (elvinguitar)
  • Technological University of the Philippines
  • Mario Gomes
  • Szymon Gruszecki
  • Aditya Gupta
  • Vulnerability Labs Team
  • Keita Haga
  • Subho Halder
  • Vulnerability Labs Team
  • David Hoyt
  • Hoyt LLC
  • Dev Kar
  • Vulnerability Labs Team
  • Dmitry Kulshitsky
  • Benjamin Kunz Mejri
  • Vulnerability Labs Team
  • Mihael Milkov (pr3da7or3)
  • Angelo Prado
  • Salesforce.com Product Security Team
  • Lukas Reschke
  • Gerardo Salazar
  • Nima Salehi
  • Ashiyane Security
  • Himanshu Sharma (нα¢кєя)
  • Prashant Sharma
  • Sow Ching Shiong
  • Jigar Soni
  • Net-Square Solutions Pvt. Ltd
  • Tencent Security Center
  • Tencent
  • Ervis Tusha
  • Longarus
  • Belmin Vehabovic
  • Matthew Wong
  • Spotflux
  • Taro Yamada

March 2012 Security Researchers

  • Vasil Andonov
  • Joao Lucas Melo Brasio
  • White Hat Hackers
  • Marco Cazzaniga
  • Charley Celice
  • Maier Cosmin
  • BackTrack Romania
  • Pouya Daneshmand
  • Jeremy Dilliplane
  • Alexander Fuchs
  • Vulnerability-Lab
  • Elvin Hayes Gentiles (elvinguitar)
  • Technological University of the Philippines
  • Ucha Gobejishvili a.k.a. longrifle0x (საქართველო)
  • Szymon Gruszecki
  • Aditya Gupta
  • Vulnerability Labs Team
  • Keita Haga
  • Subho Halder
  • XYSEC
  • Yosuke Hasegawa
  • NetAgent Co., Ltd.
  • David Hoyt
  • Hoyt LLC
  • Harpreet Jolly
  • Dev Kar
  • XYSEC
  • Vaibhav Khatke
  • Dmitry Kulshitsky
  • Ma La
  • Anand Meyyappan
  • Anna University of Technology
  • Angelo Prado
  • Salesforce.com Product Security Team
  • Jimmy_RST
  • RandomStorm Proactive Security Management
  • www.randomstorm.com
  • Luis Santana
  • HackTalk Security Team
  • Belmin Vehabovic

February 2012 Security Researchers

  • Artur Czyż
  • ACBC
  • Elvin Hayes Gentiles (elvinguitar)
  • Technological University of the Philippines
  • David Hoyt
  • Hoyt LLC
  • Vaibhav Khatke
  • Masato Kinugawa
  • Dmitry Kulshitsky
  • David Vieira-Kurz
  • MajorSecurity
  • Nicholas Lemonias
  • Advanced Information Security Corp.

January 2012 Security Researchers

  • Pouya Daneshmand
  • Geurt Dijker
  • PQR
  • Keita Haga
  • Elvin Hayes Gentiles (elvinguitar)
  • Technological University of the Philippines
  • David Hoyt
  • Hoyt LLC
  • Dmitry Kulshitsky
  • Isac Marian
  • Dominik Penner
  • RandomStorm
  • www.randomstorm.com
  • Tencent Security Center
  • Tencent
  • Belmin Vehabovic
  • Matthew Wong

December 2011 Security Researchers

  • Keita Haga
  • David Hoyt
  • Hoyt LLC
  • Masato Kinugawa
  • Julius Kivimäki
  • Dmitry Kulshitsky
  • Neal Poole
  • RandomStorm Proactive Security Management
  • www.randomstorm.com

November 2011 Security Researchers

  • Damien Bancal
  • Szymon Gruszecki
  • Keita Haga
  • Yosuke Hasegawa
  • NetAgent Co.,Ltd
  • David Hoyt
  • Hoyt LLC
  • Masato Kinugawa
  • Dmitry Kulshitsky
  • Gabriel Lima
  • PontoSec
  • Jimmy_RST
  • Ervis Tusha
  • Longarus
  • Belmin Vehabovic

October 2011 Security Researchers

  • Elie Bursztein
  • Marcin Dudek
  • Keita Haga
  • David Hoyt
  • Hoyt LLC
  • Belmin Vehabovic
  • Matthew Wong

September 2011 Security Researchers

  • Marco Cazzaniga
  • Richard J. Enbody
  • Michigan State University
  • Avram Marius Gabriel
  • Emanuele Gentili
  • Tiger Security
  • Mario Gomes
  • Szymon Gruszecki
  • Cracow University of Technology
  • Keita Haga
  • Chadi Helwe
  • Notre Dame University Louaize-Lebanon
  • David Hoyt
  • Hoyt LLC
  • AliReza Khodatalab
  • CyberBellona Security Team
  • Dmitry Kulshitsky
  • Jim O'Leary
  • Syed Irfaq Reza
  • Gemsys
  • Nima Salehi
  • Ashiyane Security
  • Aditya Sood
  • Michigan State University
  • Einar Otto Stangvik

August 2011 Security Researchers

  • Justin Bennett
  • Mt. San Jacinto College
  • Joao Lucas Melo Brasio
  • White Hat Hackers & DotFive Labs & PUC-Campinas (Brazil)
  • Szymon Gruszecki
  • Cracow University of Technology
  • Keita Haga
  • Norman Hippert
  • David Hoyt
  • Hoyt LLC
  • Dmitry Kulshitsky

July 2011 Security Researchers

  • Szymon Gruszecki
  • Cracow University of Technology
  • Keita Haga
  • Yosuke Hasegawa
  • NetAgent Co.,Ltd
  • David Viera Kurz
  • MajorSecurity (German)
  • Maitrik Patel
  • Net-square solutions pvt. Ltd
  • Himanshu Sharma
  • s3curity.net
  • Cim Stordal
  • s3curity.net

June 2011 Security Researchers

  • Keita Haga
  • Yosuke Hasegawa
  • NetAgent Co.,Ltd
  • David Hoyt
  • Hoyt LLC
  • Masato Kinugawa
  • Jean Paul V. Z.
  • (Spanish)

May 2011 Security Researchers

  • Keita Haga
  • David Hoyt
  • Hoyt LLC
  • Masato Kinugawa
  • Yvon Liu for reporting a Outlook vulnerability (CVE-2011-1252)
  • Trend Micro Threat Research
  • Stefano Di Paola
  • Minded Security
  • Einar Otto Stangvik

April 2011 Security Researchers

  • Keita Haga
  • Yosuke Hasegawa
  • NetAgent Co., Ltd
  • David Hoyt
  • Hoyt LLC
  • AliReza Khodatalab
  • CyberBellona Security Team

March 2011 Security Researchers

  • Dr. Sohrab Behrouzian
  • Ben Feinstein
  • Dell SecureWorks
  • Szymon Gruszecki
  • Cracow University of Technology (Polish)
  • David Hoyt
  • Hoyt LLC
  • Dan King
  • Dell SecureWorks

February 2011 Security Researchers

  • David Hoyt
  • Hoyt LLC

January 2011 Security Researchers

  • Robert Fly
  • salesforce.com
  • Masato Kinugawa
  • Ivan Markovic
  • Network Security Solutions

December 2010 Security Researchers

  • Damien Bancal
  • Rohit Bansal
  • SecNiche Security
  • Szymon Gruszecki
  • Cracow University of Technology (Polish)
  • David Hoyt
  • Hoyt LLC
  • Aditya K Sood
  • Michigan State University

November 2010 Security Researchers

  • David Bloom
  • Google Security Team
  • Pedro Liberal Fernández
  • Dmitry Kulshitsky
  • Nenad Vijatov
  • blog.vijatov.com

October 2010 Security Researchers

  • Baidu Security Team
  • Baidu, Inc. (Chinese)
  • Damien Bancal
  • Dr. Sohrab Behrouzian
  • Andres Blanco
  • Core Security Technologies
  • Marco Cazzaniga
  • Pouya Daneshmand
  • Ben Feinstein
  • SecureWorks
  • José Antonio Vázquez González
  • Yosuke Hasegawa
  • NetAgent Co.,Ltd
  • Knuchel Steven
  • (French)
  • Ilja Van Sprundel
  • IOActive

September 2010 Security Researchers

  • Damien Bancal
  • Yosuke Hasegawa
  • NetAgent Co.,Ltd
  • Masato Kinugawa
  • Ivan Markovic
  • netsec.rs
  • Ilja Van Sprundel
  • IOActive

August 2010 Security Researchers

  • Szymon Gruszecki
  • Cracow University of Technology (Polish)

July 2010 Security Researchers

  • Dr. Sohrab Behrouzian
  • José Antonio Vázquez González
  • Dmitry Kulshitsky
  • Carl Leonard
  • Websense
  • Nima Salehi
  • Ashiyane Security Center
  • Knuchel Steven
  • xylitol.free.fr (French)
  • Nenad Vijatov
  • blog.vijatov.com

June 2010 Security Researchers

  • Yosuke Hasegawa
  • NetAgent Co., Ltd.
  • Dmitry Kulshitsky
  • Sherif Mansour
  • Affinion International Ltd.

May 2010 Security Researchers

  • Mike Bailey
  • MAD Security
  • Dmitry Kulshitsky
  • Nenad Vijatov
  • blog.vijatov.com

April 2010 Security Researchers

  • Kevin Lam
  • Impactalabs.com
  • Dejan Levaja
  • netsec.rs
  • Derek Mauro
  • Google
  • Nima Salehi
  • Ashiyane Security Center

March 2010 Security Researchers

  • Nima Salehi
  • Ashiyane Security Center
  • David Lindsay
  • https://twitter.com/thornmaker

February 2010 Security Researchers

  • Nenad Vijatov
  • blog.vijatov.com
  • Wouter Coekaerts
  • Business Solution Builders

December 2009 Security Researchers

  • Mike Bailey
  • Skeptikal.org
  • Dr. Sohrab Behrouzian
  • Kevin Lam
  • impactalabs.com
  • Florian Weimer
  • BFK edv-consulting GmbH

November 2009 Security Researchers

  • Dr. Sohrab Behrouzian
  • Nenad Vijatov
  • blog.vijatov.com

September 2009 Security Researchers

  • Mike Bailey
  • Skeptikal.org
  • Dr. Sohrab Behrouzian
  • Drew Hintz
  • google.com
  • Knuchel Steven
  • xylitol.free.fr (French)

August 2009 Security Researchers

  • Lostmon Lords
  • lostmon.blogspot.com
  • Knuchel Steven
  • xylitol.free.fr (French)
  • Nenad Vijatov
  • blog.vijatov.com

July 2009 Security Researchers

  • Nick Merritt
  • Knuchel Steven
  • xylitol.free.fr (French)
  • Nenad Vijatov
  • blog.vijatov.com

June 2009 Security Researchers

  • Blue Moon Consulting
  • bluemoon.com.vn
  • Lostmon Lords
  • lostmon.blogspot.com
  • Security Team
  • dongabank.com.vn
  • Nenad Vijatov
  • blog.vijatov.com

May 2009 Security Researchers

  • Lee Dickey
  • Kevin Fernandez
  • Xssed.com
  • Kevin Lam
  • impactalabs.com
  • Dejan Levaja
  • netsec.rs
  • Ivan Markovic
  • netsec.rs
  • Dimitris Pagkalos
  • Xssed.com
  • Nenad Vijatov
  • blog.vijatov.com

April 2009 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Pierre Gardenat
  • Kevin Lam
  • impactalabs.com
  • Dimitris Pagkalos
  • Xssed.com

March 2009 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Andrew Johnstone
  • Dejan Levaja
  • netsec.rs
  • Ivan Markovic
  • netsec.rs
  • Dimitris Pagkalos
  • Xssed.com
  • Helmi Rais
  • Paul Ritchie
  • Nenad Vijatov
  • blog.vijatov.com

February 2009 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Dan Hubbard and the Websense Security Labs
  • websense.com
  • Andrew Johnstone
  • Kevin Lam
  • Impactalabs.com
  • Dejan Levaja
  • netsec.rs
  • Ivan Markovic
  • netsec.rs
  • Tavis Omandy
  • Dimitris Pagkalos
  • Xssed.com
  • Thomas Pollet
  • Nenad Vijatov
  • blog.vijatov.com

January 2009 Security Researchers

  • Steven Burn
  • it-mate.co.uk
  • Kevin Fernandez
  • Xssed.com
  • Kevin Lam
  • Impactalabs.com
  • Dejan Levaja
  • netsec.rs
  • Kentaro Ohshima
  • Renesas Technology
  • Dimitris Pagkalos
  • Xssed.com
  • Sven Türpe
  • testlab.sit.fraunhofer.de
  • Nenad Vijatov
  • vijatov.com

December 2008 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Kevin Lam
  • Impactalabs.com
  • Dejan Levaja
  • netsec.rs
  • Dimitris Pagkalos
  • Xssed.com
  • Thomas Pollet

November 2008 Security Researchers

  • Dr. Sohrab Behrouzian
  • Kevin Lam
  • Impactalabs.com
  • Dejan Levaja
  • netsec.rs
  • Kevin Fernandez
  • Xssed.com
  • Fernando Munoz
  • beford.org
  • Dimitris Pagkalos
  • Xssed.com

September 2008 Security Researchers

  • Charles Hooper
  • charleshooper.net
  • Kevin Lam
  • Impactalabs.com
  • Ivan Markovic
  • security-net.biz

August 2008 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Kevin Lam
  • Impactalabs.com
  • Dimitris Pagkalos
  • Xssed.com

July 2008 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Dan Hubbard and the Websense Security Labs Team
  • websensesecuritylabs.com
  • Tavis Ormandy
  • google.com
  • Dimitris Pagkalos
  • Xssed.com

June 2008 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Kevin Lam
  • Impactalabs.com
  • Dimitris Pagkalos
  • Xssed.com

May 2008 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Ronald van den Heetkamp
  • rvdh.ath.cx
  • Kevin Lam
  • Impactalabs.com
  • Dimitris Pagkalos
  • Xssed.com
  • Dror Shalev
  • checkpoint.com

April 2008 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Kevin Lam
  • Impactalabs.com
  • Opera Software ASA
  • opera.com
  • Dimitris Pagkalos
  • Xssed.com

March 2008 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Gareth Heyes
  • businessinfo.co.uk
  • Kevin Lam
  • Impactalabs.com
  • Dejan Levaja
  • netsec.rs
  • Dimitris Pagkalos
  • Xssed.com
  • Paul Ritchie
  • Securetest.com

February 2008 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Kevin Lam
  • Impactalabs.com
  • Dimitris Pagkalos
  • Xssed.com

January 2008 Security Researchers

  • Alireza Ahari
  • Marco Cazzaniga
  • Kevin Fernandez
  • Xssed.com
  • Kevin Lam
  • Impactalabs.com
  • Dimitris Pagkalos
  • Xssed.com
  • Sven Turpe

December 2007 Security Researchers

  • Cocoruder
  • Fortinet
  • Kevin Fernandez
  • Xssed.com
  • Michael Krax
  • Kevin Lam
  • Impactalabs.com
  • Dejan Levaja
  • Netsec.rs
  • Dimitris Pagkalos
  • Xssed.com
  • Vadim Pogulievsky
  • Finjan

November 2007 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Kevin Lam
  • Impactalabs.com
  • Dejan Levaja
  • Dimitris Pagkalos
  • Xssed.com
  • Berend-Jan Wever

October 2007 Security Researchers

  • Kevin Fernandez
  • Xssed.com
  • Kevin Lam
  • Impactalabs.com
  • Dimitris Pagkalos
  • Xssed.com

September 2007 Security Researchers

  • Kevin Fernandez
  • Marc Maiffret
  • eEye Digital Security
  • Fernando Munoz
  • Mike Scott
  • SAIC

August 2007 Security Researchers

  • Kevin Fernandez
  • www.xssed.com
  • Marc Maiffret
  • eEye Digital Security
  • Fernando Munoz
  • Nicob
  • Dimitris Pagkalos
  • www.xssed.com
  • Dinos Pastos
  • MSC Advanced Software Engineering
  • Aviv Raff
  • Finjan Malicious Code Research Center
  • Woo Shi
  • Fudan Grand Horizon Ltd
  • Martin Straka

July 2007 Security Researchers

  • Will Dormann
  • CERT Coordination Center
  • Laurens Greven
  • Robert Hansen
  • SecTheory – Internet Security
  • Dan Hubbard
  • Websense Security Labs
  • Fernando Muñoz
  • http://beford.org/
  • Dinos Pastos
  • MSC Advanced Software Engineering
  • Hernán Marcelo Racciatti
  • SICinformática
  • Aviv Raff
  • Finjan Malicious Code Research Center
  • Rod Rasmussen
  • Internet Identity
  • Amish Shah
  • Net –Square