Dragon Sector is a Polish security Capture The Flag team. It was created in February 2013 and currently has 17 active members. We frequently participate in both online and offline security Capture The Flag competitions, publish write-ups on CTF tasks (both on our blog and in a Polish magazine „Programista“) and sometimes even organize CTFs.
Our news/press site. Our blog. Our Twitter account.
valis (captain)
A computer geek fascinated by security ever since he saw "WarGames" long time ago. Specializes in low-level exploitation and web hacking. Other interests include SF books, mixology and amateur car racing.
Michał "Redford" Kowalczyk (vice captain)
A reverse engineer interested in cryptography and low-level hacking, who analyzes random things just to check how they work. Currently works at Invisible Things Lab on SGX-related projects.
E-mail: redford@dragonsector.pl
Twitter: @dsredford
IRC: Redford on Libera
Sergiusz "q3k" Bazański
A self-taught systems engineer that dabbles in security, networking, hardware hacking, digital logic and anything that might involve electrons in some shape or form. Enjoys unusual liquors, obscure computer architectures and bad puns.
E-mail: q3k@q3k.org
Twitter: @q3k
IRC: q3k on Libera
mak
Some sort of researcher who likes to play with bytes, currently pwning botnets for a living. As a leftover from school he poses some skills in program verification and other formal method associated with theory of programming language. Huge fan of beer, chaos and improvisation.
E-mail: mak@lokalhost.pl
Twitter: @maciekkotowicz
Krzysztof "vnd" Katowicz-Kowalewski
Security researcher and computer programmer who enjoys thinking out of the box and hacking all sort of things. Also interested in AI, RE and software optimizations.
E-mail: vnd@vndh.net
Twitter: @varseand
tkd
A software engineer currently based in London. Got into CTFs through Warsaw Hackerspace. Always on the lookout for new things to learn.
Jakub "Lympho" Korepta
Genetics lover. Mystery solver. Hitch-hiking passionate. Waiting for his Call Of The Wild solving Security challenges. In free time he's focused on protein folding and pathogenic viruses.
WWW: http://lympho.pl/
Email: lymphocytus@gmail.com
Tomasz "KeiDii" Bukowski
Nuclear Physicist. Sysadmin/BOFH/programmer.
Currently works as security guy in Bank Millennium.
Almost understand how computers works. Gamer. Biker.
Robert "jagger" Swiecki
Roxah by day, haxor by night. Was growing up in a communist country, where oranges could be bought once a year for Christmas, half-rotten, after having been transported by a ship from another country in the block (thanks Cuba!:). Plays soccer, smashes opponents in ping-pong. Works as an Information Security Engineer at Google.
WWW: http://www.swiecki.net
Twitter: @robertswiecki
E-mail: robert@swiecki.net
Mateusz "mlen" Lenik
Software engineer who likes not-so-popular unix-like systems, computer security and hiking.
Bartosz "implr" Stebel
Yet another hacker enthusiastic about anything electronic that is weird, interesting or obscure at any level, from FPGAs to advanced functional type systems. His free time is spent making sure Warsaw Hackerspace survives yet another year.
Twitter: @implring
Marcelina "mwk" Kościelnicka
A programmer interested in cryptography, reverse engineering, hardware, and reverse engineering hardware. For some reason, people keep mistaking her for a security specialist.
IRC: mwk on Libera
Twitter: @mwk4
Borys "borysp" Popławski
Fan of (almost) everything that's low-level and pwnable. Got into hacking after randomly attending a lecture by Redford. Studying Computer Science at the University of Warsaw in his spare time.
IRC: borysp on Libera
Twitter: @boryspop
Gynvael Coldwind (captain emeritus)
Just another security researcher specializing in showing slides to other people. Apart from security interested in game dev, procedurally generated graphics and e-sport. Works as an information security engineer at one of the existing companies.
Blog: http://gynvael.coldwind.pl/
Twitter: @gynvael
E-mail: gynvael@coldwind.pl
Mateusz "j00ru" Jurczyk (vice captain emeritus)
A big fan of memory corruption. His main areas of interest are client software security, vulnerability exploitation and mitigation techniques, and delving into the darkest corners of low-level kernel internals with a very strong emphasis on Microsoft Windows. He currently works as a security researcher at Google Project Zero.
Blog: http://j00ru.vexillium.org/
Twitter: @j00ru
E-mail: j00ru.vx@gmail.com
Inactive members: