Professional Path

Christ Bowel

Identify: Christ Bowel

Currently a 19-year-old Computer Science student at TU Darmstadt. Beyond the classroom, I spend my free time breaking things and deep-diving into vulnerability research to understand how systems fail.

I focus on vulnerability research and offensive security tooling. My technical track record includes the discovery and documentation of CVE-2024-29643, where I engineered a functional PoC to demonstrate critical logical flaws in system implementations.

With a technical foundation built during my free time, I’ve shifted my focus toward the logic of exploitation. I enjoy deconstructing complex systems to find where they're vulnerable, developing custom tools in Go, Java, and Python to automate my research and bridge the gap between theory and a working PoC.

Current Task: Advanced Threat Research // Base: Darmstadt, Germany

Security Record_

Vulnerability Researcher & Bug Hunter (Free time)

HackerOne Verified Verified Hunter_
2022 - Present

Independent security researcher identifying critical vulnerabilities across international government and corporate infrastructures.

  • Achieved Remote Code Execution (RCE) on a government platform via SQL Injection.
  • Identified high-impact flaws: IDOR, Business Logic Flaws, and Privilege Escalation.
  • Recognized in the Hall of Fame of the State of California, BIA, and Mars VDP.
  • Ranked 15/454 at the Bugcrowd Black Hat USA CTF 2024.

Career Focus _

Currently looking for Werkstudent or Internship positions in the Darmstadt-Frankfurt area or Remote. Open to contributing in the following areas:

Vulnerability Analysis

Ready to assist in security assessments and identifying vulnerabilities (OWASP Top 10). Capable of conducting remote audits and providing structured technical reports.

Security Automation

Developing Python/Go scripts to automate internal security tasks. Experienced in remote collaboration using Git to deliver code independently.

Infrastructure Sec

Supporting the implementation of security best practices. Fully equipped for system hardening, technical documentation, and virtual team collaboration.

Technical Arsenal_

Java

Java

Go

Go

Python

Python

Bash

Bash

Git

Git

Metasploit

Metasploit

Burp Suite

Burp Suite

Ghidra

Ghidra

Wireshark

Wireshark

Impacket

Impacket

Windows

Windows

MS Office

MS Office

Linux

Linux

Research & Logic _

  • Core Stack

    Advanced use of Burp Suite Pro for API and web protocol auditing. Development of offensive tooling using Go, Python, and Java to automate reconnaissance and exploit delivery.

  • Offensive Mindset

    Focused on breaking complex systems and identifying logical flaws. Experience documenting CVE-2024-29643 and engineering functional PoCs to demonstrate high-impact vulnerabilities.

  • Academic Foundation

    B.Sc. Computer Science student at TU Darmstadt. Deep-diving into low-level system architecture, memory corruption, and reverse engineering with Ghidra and GDB.

  • Workflow & Ops

    Utilizing industry-standard tools like Impacket, BloodHound, and Responder for network auditing. Proficient in version control (Git) and structured reporting for technical audits.

Source Code & PoCs

Explore my technical repositories, custom offensive tools, and vulnerability research documentation.

Access Repositories_

Security Inquiry?

I'm currently focused on my studies at TU Darmstadt, but I'm always open to discussing vulnerability research, pentesting projects, or CTF collaborations.