Hi! I'm Christbowel

Computer Science student at Technische Universität Darmstadt.
Offensive Security Researcher & Bug Hunter with a versatile approach to tech.
Discoverer of CVE-2024-29643

python //
go //
java //
bash //
git //
linux //
wireshark //
burpsuite //
metasploit //
ghidra //
windows //
python //
go //
java //
bash //
git //
linux //
wireshark //
burpsuite //
metasploit //
ghidra //
windows //
python //
go //
java //
bash //
git //
linux //
wireshark //
burpsuite //
metasploit //
ghidra //
windows //
Christ Bowel

About Me

I'm Christ Bowel, a Computer Science student at TU Darmstadt specializing in Offensive Security.

Currently seeking Werkstudent or Internship positions in the Darmstadt/Frankfurt area.

My work focuses on vulnerability research and bug hunting. I have been recognized in international Hall of Fame lists including the State of California and Mars VDP.

Discoverer of CVE-2024-29643 and developer of open-source security tools like Infiltrator.

Read Full Bio

Featured Research & Projects

A selection of my vulnerability findings and security tools.

Project: CVE-2024-29643 Research Vulnerability Found

CVE-2024-29643 Research

Vulnerability Research NVD/NIST Cyber
Project: Infiltrator - Go Tool

Infiltrator - Go Tool

Go Telegram API System
Project: CVE-2024-25600 Nuclei Template Vulnerability Found

CVE-2024-25600 Nuclei Template

Nuclei YAML Automation
Project: CipherBuster

CipherBuster

Python Cryptography RSA
Project: OpenSSH 9.1 Scanner

OpenSSH 9.1 Scanner

Python Networking Exploit Dev

Technical Arsenal _

  • Web & API Pentest

    Burp Suite Professional (BApp extensions, custom macros, advanced fuzzing). FFuf/Gobuster for discovery. SQLMap for automated injection testing. Nuclei for template-based vulnerability scanning. Custom offensive tooling in Go/Python.

  • Binary & Exploit Dev

    Ghidra/IDA Pro for static analysis. GDB (Pwnbg/Gef) for dynamic debugging. Exploit development for Memory Corruption (Buffer Overflow, ROP chains) and Logical Flaws. CVE-2024-29643 PoC development.

  • Infrastructure & AD

    Impacket suite (psexec, wmiexec, secretsdump). BloodHound for AD path analysis. Responder for LLMNR/NBT-NS poisoning. CrackMapExec (CME) for network enumeration and lateral movement. Kerberoasting and Silver/Golden Ticket attacks.

Security Inquiry?

I'm currently focused on my studies at TU Darmstadt, but I'm always open to discussing vulnerability research, pentesting projects, or CTF collaborations.