Personal Information
Organization / Workplace
Bangkok Metropolitan Area, Thailand Thailand
Occupation
Senior Member of Technical Staff at VMware
Industry
Technology / Software / Internet
About
Summary:
- More than 10 years of experience in IT industry focusing on Application Security, Secure Software Development Lifecycle
- Specialized in vulnerability assessment and secure code review for web-based, server-side, client-side, cloud, and mobile application
- Experienced in Unix/Windows System administration, TCP/IP networking
- Personally interested in Exploit Development and Reverse Engineering
Likes
(93)Work with Developers for Fun and Progress - AppSec California
leifdreizler
•
5 years ago
Browser exploitation SEC-T 2019 stockholm
Jameel Nabbo
•
4 years ago
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat Security Conference
•
6 years ago
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
Laurentiu Meirosu
•
6 years ago
Secure Software Design for Data Privacy
Narudom Roongsiriwong, CISSP
•
4 years ago
OWASP SF - Reviewing Modern JavaScript Applications
Lewis Ardern
•
5 years ago
Smart Contract programming 101 with Solidity #PizzaHackathon
Sittiphol Phanvilai
•
5 years ago
No more ARP : Another MiTm Attacks
Khajornchol Puwarang
•
5 years ago
Burp Extender API for Penetration Testing
Pichaya Morimoto
•
6 years ago
Jwt == insecurity?
snyff
•
6 years ago
RF Hacking Red Pill 2017
Keerati Torach
•
6 years ago
Secure Your Encryption with HSM
Narudom Roongsiriwong, CISSP
•
6 years ago
Certificate Pinning in Mobile Applications
Luca Bongiorni
•
9 years ago
Create connected home devices using a Raspberry Pi, Siri and ESPNow for makers.
Nat Weerawan
•
7 years ago
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Peter Hlavaty
•
7 years ago
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
Chris Gates
•
7 years ago
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
Nikhil Mittal
•
7 years ago
Secure PHP Coding
Narudom Roongsiriwong, CISSP
•
7 years ago
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
Frans Rosén
•
7 years ago
From zero to SYSTEM on full disk encrypted windows system
Nabeel Ahmed
•
7 years ago
OWASP Top 10 A4 – Insecure Direct Object Reference
Narudom Roongsiriwong, CISSP
•
7 years ago
Exploiting Blind Vulnerabilities
Pichaya Morimoto
•
7 years ago
Unlock Security Insight from Machine Data
Narudom Roongsiriwong, CISSP
•
7 years ago
Security As A Code :
ทวิร พานิชสมบัติ
•
7 years ago
New methods for exploiting ORM injections in Java applications
Mikhail Egorov
•
7 years ago
AnyID: Security Point of View
Narudom Roongsiriwong, CISSP
•
7 years ago
Python Worst Practices
Daniel Greenfeld
•
12 years ago
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk
Beau Bullock
•
8 years ago
SyScan360 - Stefan Esser - OS X El Capitan sinking the S\H/IP
Stefan Esser
•
8 years ago
The Joy of Sandbox Mitigations
James Forshaw
•
8 years ago
Personal Information
Organization / Workplace
Bangkok Metropolitan Area, Thailand Thailand
Occupation
Senior Member of Technical Staff at VMware
Industry
Technology / Software / Internet
About
Summary:
- More than 10 years of experience in IT industry focusing on Application Security, Secure Software Development Lifecycle
- Specialized in vulnerability assessment and secure code review for web-based, server-side, client-side, cloud, and mobile application
- Experienced in Unix/Windows System administration, TCP/IP networking
- Personally interested in Exploit Development and Reverse Engineering