This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "User:Tal Mel"

From OWASP
Jump to: navigation, search
m (add image)
m (remove irrelevant data)
Line 14: Line 14:
 
[2001-2004] &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Platoon Sergeant @ [http://www.idf.il/english/ Israel Defense Forces (IDF)] <br>
 
[2001-2004] &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Platoon Sergeant @ [http://www.idf.il/english/ Israel Defense Forces (IDF)] <br>
 
<br>
 
<br>
 
== Conferences ==
 
[2017] [https://program.sha2017.org/events/230.html Hack-a-ble: Hacking BLE Smart Devices] @
 
[https://sha2017.org/7 SHA 2017] <br>
 
Download: n/a | Watch: [https://media.ccc.de/v/SHA2017-230-hack-a-ble Video]<br>
 
 
[2017] [https://bsidestlv.com/schedule/bsidestlv-underground/ Break-a-ble: Hacking Your Smartphone with BLE] @
 
[https://bsidestlv.com BSidesTLV 2017] <br>
 
Download: n/a | Watch: n/a
 
 
[2017] [https://www.owasp.org/index.php/OWASP_Israel_January_2017#RUaBLE_BLE_Application_Hacking Hacking BLE Applications] @ [https://www.owasp.org/index.php/OWASP_Israel_January_2017 OWASP Israel 2017] <br>
 
Download: [https://www.owasp.org/images/6/6f/OWASP2017_HackingBLEApplications_TalMelamed.pdf Presentation] | Watch: n/a
 
 
[2016] [https://www.owasp.org/index.php/AppSec_Israel_2016_Presentations#Java_Hurdling:_Obstacles_and_Techniques_in_Java_Client_Penetration-testing Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing] @ [https://www.owasp.org/index.php/AppSec_Israel_2016 OWASP AppSec IL 2016] <br>
 
Download: [https://www.owasp.org/images/f/fb/AppSecIL2016_JavaHurdling_TalMelamed.pdf Presentation] | Watch:  [https://www.youtube.com/watch?v=oq4phacH9WY Video]
 
  
 
== Projects ==
 
== Projects ==
[[OWASP_Path_Traverser|OWASP Path Traverser]] <br>
+
[[OWASP_Path_Traverser|'''OWASP Path Traverser''']] <br>
[[OWASP_Rainbow_Maker_Project|OWASP Rainbow Maker]]<br>
+
[[OWASP_Rainbow_Maker_Project|'''OWASP Rainbow Maker''']]<br>
[https://appsec-labs.com/AppUse AppUse - Android Pentest Platform Unified Standalone Environment] <br>
+
[https://github.com/nu11p0inter/kingpin/ Kingpin - TCP/SSL Proxy] <br>
[https://appsec-labs.com/iNalyzer iNalyzer - iOS Penetration testing Framework] <br>
 
[https://appsec-labs.com/iNalyzer iNalyzer - iOS Penetration testing Framework] <br>
 
[https://appsec-labs.com/kingpin/ Kingpin - TCP/SSL Proxy] <br>
 
 
<br>
 
<br>
  

Revision as of 12:43, 27 February 2018

Tal melamed owasp.jpg

Tal Melamed
Tal Melamed
[email protected]

Experience

[2017-Present]    Cyber Security Advisor @ FBK
[2017-Present]    Security Researcher @ Synack
[2013-Present]    Tech Lead | Application Security Expert @ AppSec Labs
[2011-2013]         Information Security Analyst @ Amdocs
[2009-2011]         Security Researcher @ CheckPoint Software Technologies
[2006-2008]         Fraud Analyst @ RSA, The Security Division of EMC
[2004-2005]         Security Team @ Israel Aerospace Industries (IAI)
[2001-2004]         Platoon Sergeant @ Israel Defense Forces (IDF)

Projects

OWASP Path Traverser
OWASP Rainbow Maker
Kingpin - TCP/SSL Proxy

Pages

LinkedIn
AppSec.it
Github