This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "User:Tal Mel"
m (remove irrelevant data) |
(update data) |
||
Line 3: | Line 3: | ||
'''Tal Melamed''' <br> | '''Tal Melamed''' <br> | ||
[email protected] <br> | [email protected] <br> | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
<br> | <br> | ||
Line 20: | Line 10: | ||
[https://github.com/nu11p0inter/kingpin/ Kingpin - TCP/SSL Proxy] <br> | [https://github.com/nu11p0inter/kingpin/ Kingpin - TCP/SSL Proxy] <br> | ||
<br> | <br> | ||
+ | |||
+ | |||
+ | == Conferences == | ||
+ | [https://www.owasp.org/index.php/AppSec_Israel_2016_Presentations '''OWASP AppSec Israel 2016'''] - Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing [https://www.owasp.org/index.php/AppSec_Israel_2016_Presentations#Java_Hurdling:_Obstacles_and_Techniques_in_Java_Client_Penetration-testing Download] [https://www.youtube.com/watch?v=oq4phacH9WY YouTube]<br> | ||
+ | [https://www.owasp.org/index.php/OWASP_Israel_January_2017 '''OWASP Israel 2017'''] - [https://www.owasp.org/index.php/OWASP_Israel_January_2017#RUaBLE_BLE_Application_Hacking R U aBLE? BLE Application Hacking]<br> | ||
+ | Other talks: https://appsec.it/talks | ||
+ | <br><br> | ||
== Pages == | == Pages == | ||
Line 25: | Line 22: | ||
[http://AppSec.it AppSec.it] <br> | [http://AppSec.it AppSec.it] <br> | ||
[https://github.com/nu11p0inter/ Github] <br> | [https://github.com/nu11p0inter/ Github] <br> | ||
+ | [https://twitter.com/@_nu11p0inter/ Github] <br> | ||
<br> | <br> | ||
+ | <br> | ||
+ | |||
+ | == Experience == | ||
+ | [2017-Present] '''Cyber Security Advisor''' @ [https://fbk.eu FBK]<br> | ||
+ | [2017-Present] '''Security Researcher''' @ [https://www.synack.com/red-team/ Synack]<br> | ||
+ | [2013-Present] '''Tech Lead | Application Security Expert''' @ [https://appsec-labs.com AppSec Labs]<br> | ||
+ | [2011-2013] Information Security Analyst @ [http://amdocs.com Amdocs]<br> | ||
+ | [2009-2011] Security Researcher @ [http://www.checkpoint.com/products/dlp-software-blade/ CheckPoint Software Technologies] <br> | ||
+ | [2006-2008] Fraud Analyst @ [http://www.emc.com/security/rsa-identity-protection-and-verification/rsa-fraudaction.htm RSA, The Security Division of EMC] <br> | ||
+ | [2004-2005] Security Team @ [http://www.iai.co.il/ Israel Aerospace Industries (IAI)] <br> | ||
+ | [2001-2004] Platoon Sergeant @ [http://www.idf.il/english/ Israel Defense Forces (IDF)] <br> | ||
<br> | <br> |
Revision as of 12:56, 27 February 2018
Tal Melamed
Tal Melamed
[email protected]
Projects
OWASP Path Traverser
OWASP Rainbow Maker
Kingpin - TCP/SSL Proxy
Conferences
OWASP AppSec Israel 2016 - Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing Download YouTube
OWASP Israel 2017 - R U aBLE? BLE Application Hacking
Other talks: https://appsec.it/talks
Pages
LinkedIn
AppSec.it
Github
Github
Experience
[2017-Present] Cyber Security Advisor @ FBK
[2017-Present] Security Researcher @ Synack
[2013-Present] Tech Lead | Application Security Expert @ AppSec Labs
[2011-2013] Information Security Analyst @ Amdocs
[2009-2011] Security Researcher @ CheckPoint Software Technologies
[2006-2008] Fraud Analyst @ RSA, The Security Division of EMC
[2004-2005] Security Team @ Israel Aerospace Industries (IAI)
[2001-2004] Platoon Sergeant @ Israel Defense Forces (IDF)