Live webinar | March 27th: Learn the future of AppSec as we launch our vision for Burp Suite in 2025.            Register Now

Martin Doyhenard

Researcher

Martin Doyhenard

Martin Doyhenard is a Security Researcher at Portswigger, known for exploiting HTTP Servers and Web Applications. His latest work includes HTTP Response Smuggling and exploiting SAP’s Inter-Process Communication - compromising more than 200 thousand companies in the world.

He’s passionate about low level reverse engineering and testing his skills in online CTFs.

Over the past few years, he presented his findings in some top security conferences including BlackHat, DEFCON, RSA, EkoParty, Hack in The Box and Troopers.

When not hunting for vulnerabilities, Martin can be found playing football or engaging in a chess game.

Martin's Favourite Papers