About
// bio
Adam Crosser. Offensive security researcher specializing in web exploitation and red team tradecraft. Currently R&D at [Praetorian](https://www.praetorian.com), supporting red team operations.
Research focus: identifying critical vulnerabilities in widely-deployed enterprise software. Work has resulted in multiple critical CVEs affecting F5 BIG-IP and Qlik Sense Enterprise—subsequently exploited in the wild by nation-state actors and ransomware operators.
Conference speaker at HITB Bangkok, Black Hat USA, and DEF CON covering request smuggling, OAuth abuse, and covert command & control.
// contact
- GitHub github.com/unc1739
- Twitter @unc1739
- LinkedIn linkedin.com/in/adamcrosser