Handpicked from the best our community has to offer

The committee



Patroklos Argyroudis (argp) is a computer security researcher at CENSUS. His main expertise is vulnerability research, exploit development, reverse engineering and source code auditing.
Patroklos has presented his research at several international security conferences (Black Hat USA, Black Hat EU, Infiltrate, CanSecWest, Chaos Communication Congress, etc.) on topics such as kernel and heap exploitation, kernel protection technologies, and network security protocols.
He holds a PhD from Trinity College Dublin, where he has also worked as a postdoctoral researcher on applied cryptography.



Jean-Baptiste Bédrune has 15 years of experience in the security industry. His main areas of expertise are reverse engineering, applied cryptography, vulnerability research, and software and content protection.


Vigilant Labs

Amat is principal researcher for Vigilant Labs, a company specialising in cutting edge security research After his first participation at Pwn2Own Vancouver and Tokyo in 2017, he became a member of the fluoroacetate duo that won Master of Pwn at Pwn2Own Tokyo 2018, 2019 and Pwn2Own Vancouver 2018, 2019 and 2020. His main areas of interest are hypervisors, basebands and kernels.



Marco Grassi is currently an Expert in Information Security. He is part of the team that won the "Mobile Master of Pwn" title in Tokyo for Mobile Pwn2Own 2016, working on iOS. He was also one of the main contributors at Desktop Pwn2Own 2016 for the Safari target with sandbox escape to root. He is a member of the team that won the title of "Master Of Pwn" at Pwn2Own 2016. He found a VMWare escape at Desktop Pwn2Own 2017, and baseband RCE and wifi iOS at Mobile Pwn2Own 2017 where they were awarded "Master Of Pwn" for the third time.
He has spoken at several international security conferences such as Black Hat USA, DEF CON, Infiltrate, CanSecWest, ZeroNights, Codegate, HITB and ShakaCon. He is also released with @qwertyoruiopz a iOS Jailbreak for iOS 10.2.



Ophir Harpaz is a security research team lead in Akamai Technologies. She enjoys reverse engineering, fighting cybercriminals and playing CTFs.
Ophir has spoken in various security conferences including Black Hat USA, Botconf, SEC-T, HackFest and more. She has taught a reverse-engineering workshop and published an online version of it at to share her enthusiasm for reversing.
Ophir has entered Forbes' list of 30-under-30 and won the Rising Star category of SC Magazine's Reboot awards for her achievements and contribution to the Cyber security industry.


Dataflow Security

Bruno is a co-founder and managing partner at Dataflow Security. He's worked mostly on browser RCEs throughout his career in offensive security and successfully took part in Pwn2Own on multiple occasions.



Vitaly is a security researcher at DUASYNT specializing in reverse engineering and exploit development. He has a solid academic background in programming languages, code analysis and algorithms. His current area of research is mobile security/operating systems (kernel space exploitation techniques and countermeasures).


IBM X-Force

Researcher focused on low level vulnerabilities, exploit development and offensive security.



Probably the best thing the Limousin region has ever offered to the world along with the "pâté de pommes de terre", Fabien Périgaud is a reverse engineering technical lead for Synacktiv. Don't be fooled by its good-naturedness, Fabien's effectiveness is only rivaled by its skills in demolishing HP's iLOs or solving the SSTIC challenge at a blazingly fast pace whilst sipping a 10-year old scot'. Bio written by its personal brand manager and #1 fan.



Axel has been deeply passionate about software security and computers for the past 15+ years and have been working in the industry for the past 8+ years. He has extensive experience in reverse-engineering, binary exploitation, tooling development and anything low-level programming.



Gabrielle is working as a security engineer specialized in reverse engineering. Her main domains of interest are the Windows internals and UEFI components. She is part of BlackHoodie from the very first edition and belongs to the organization crew. She also contributes as a speaker and trainer during not just BlackHoodie but also other security-related events. She spoke at international conferences including Black Hat, Ekoparty and Infiltrate and is part of multiple program committees.