Professional Path
Identify: Christ Bowel
Currently a 19-year-old Computer Science student at TU Darmstadt. Beyond the classroom, I spend my free time breaking things and deep-diving into vulnerability research to understand how systems fail.
I focus on vulnerability research and offensive security tooling. My technical track record includes the discovery and documentation of CVE-2024-29643, where I engineered a functional PoC to demonstrate critical logical flaws in system implementations.
With a technical foundation built during my free time, I’ve shifted my focus toward the logic of exploitation. I enjoy deconstructing complex systems to find where they're vulnerable, developing custom tools in Go, Java, and Python to automate my research and bridge the gap between theory and a working PoC.
Current Task: Advanced Threat Research // Base: Darmstadt, Germany
Security Record_
Vulnerability Researcher & Bug Hunter (Free time)
Independent security researcher identifying critical vulnerabilities across international government and corporate infrastructures.
- ▸ Achieved Remote Code Execution (RCE) on a government platform via SQL Injection.
- ▸ Identified high-impact flaws: IDOR, Business Logic Flaws, and Privilege Escalation.
- ▸ Recognized in the Hall of Fame of the State of California, BIA, and Mars VDP.
- ▸ Ranked 15/454 at the Bugcrowd Black Hat USA CTF 2024.
Career Focus _
Currently looking for Werkstudent or Internship positions in the Darmstadt-Frankfurt area or Remote. Open to contributing in the following areas:
Vulnerability Analysis
Ready to assist in security assessments and identifying vulnerabilities (OWASP Top 10). Capable of conducting remote audits and providing structured technical reports.
Security Automation
Developing Python/Go scripts to automate internal security tasks. Experienced in remote collaboration using Git to deliver code independently.
Infrastructure Sec
Supporting the implementation of security best practices. Fully equipped for system hardening, technical documentation, and virtual team collaboration.
Technical Arsenal_
Java
Go
Python
Bash
Git
Metasploit
Burp Suite
Ghidra
Wireshark
Impacket
Windows
MS Office
Linux
Research & Logic _
- Core Stack
Advanced use of Burp Suite Pro for API and web protocol auditing. Development of offensive tooling using Go, Python, and Java to automate reconnaissance and exploit delivery.
- Offensive Mindset
Focused on breaking complex systems and identifying logical flaws. Experience documenting CVE-2024-29643 and engineering functional PoCs to demonstrate high-impact vulnerabilities.
- Academic Foundation
B.Sc. Computer Science student at TU Darmstadt. Deep-diving into low-level system architecture, memory corruption, and reverse engineering with Ghidra and GDB.
- Workflow & Ops
Utilizing industry-standard tools like Impacket, BloodHound, and Responder for network auditing. Proficient in version control (Git) and structured reporting for technical audits.
Source Code & PoCs
Explore my technical repositories, custom offensive tools, and vulnerability research documentation.
Access Repositories_Security Inquiry?
I'm currently focused on my studies at TU Darmstadt, but I'm always open to discussing vulnerability research, pentesting projects, or CTF collaborations.