Türkiye
I’m a cybersecurity entrepreneur and reverse engineer with over 15 years of experience in offensive security and vulnerability research. I founded TRAPMINE, a next-generation endpoint security company, which was later acquired by SonicWall. My work has contributed to the discovery of critical vulnerabilities in major vendors like Apple, Adobe, and Microsoft. I've spoken at international hacker conferences and have built tools focused on fuzzing, exploit research, malware evasion, and secure endpoint defense. I have been a speaker at: - Power of Community 2015, South Korea - Code Blue 2014, Japan - Swiss Cyber Storm 3 , Switzerland - CONFidence 2010 , Poland - Defcamp 2014, Romania - Kuwait Infosec 2013, Kuwait - Siber Guvenlik Konferansi, Turkey - IstSec'11 , Turkey - AnkaSec 2010 , Turkey - NOPcon , Turkey Some of the vulnerabilities I've discovered: Microsoft Office 2007/2010/2013/2016 Remote Code Execution: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6093 Microsoft Windows Kernel Info Disclosure: https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2017-0167 Adobe Shockwave Player Memory Corruption : http://www.securityfocus.com/bid/48297/info Microsoft Windows Mobile Double Free Vuln: https://www.exploit-db.com/exploits/15297 HTC Touch2 Media Player Mobile Memory Corruption: http://www.securityfocus.com/archive/1/520800 Invensys Wonderware SCADA Multiple Flaws: https://www.cisa.gov/news-events/ics-advisories/icsa-12-081-01 CoDeSys Scada Buffer Overflow: https://www.cisa.gov/news-events/ics-alerts/ics-alert-11-336-01a Schneider Electric IGSS SCADA Buffer Overflow: https://www.cisa.gov/news-events/ics-advisories/icsa-11-355-01 Novell eDirectory HTTPSTK Login Buffer Overflow: http://www.securityfocus.com/bid/37042 Progea SCADA Remote Info Disclosure: https://www.cisa.gov/news-events/ics-advisories/icsa-14-105-01
- Achieved acquisition by SonicWall in 2023. - Acted as both CEO and technical lead, overseeing business strategy and development of threat detection engines and anti-exploit technologies. - Built an advanced EDR
Organizing the largest international hacker conference in Turkey
- Delivering specialized offensive security services for Ministry of Defense organizations across multiple countries. - Conducting advanced exploit development training and comprehensive penetration testing engagements. - Discovering and responsibly reporting zero-day vulnerabilities to leading acquisition programs, including iDEFENSE, Zero Day Initiative etc.
Worked as a contractor to provide security research and conduct penetration testing. http://hackattack.com