Our team consists only of enthusiasts - experienced penetration testers, IT security researchers, and programmers. We have two things in common: we love hacking and we want to share it. We believe that only through practical training, not only in defense but also in offense, you can keep pace with today's constantly changing world. In our opinion, one of the best ways to polish the techniques of finding and exploiting bugs is the international IT security competition called Capture The Flag.
Lecturers at STM Academy are members of the best Polish CTF groups. Together with them, we are successful in global struggles. Our greatest success in 2022 was "Poland Can Into Space" taking 1st place in the "Hack-a-Sat" competition organized by the US military.
Meet our lecturers
Teaching manager and lecturer
Mateusz Pstruś "Mawekl"
IT enthusiast from an early age, one of the world's best wargame (IT security) players. He started his adventure at the age of 13, registering on the first Polish website devoted to this subject - TDHack.com - where, as one of two people, he completed all the tasks (for over 32,000 users). As a 15-year-old, he founded his own Security Traps website with IT security challenges.
At the beginning of 2013, he joined the newly formed CTF Dragon Sector team, which has achieved numerous successes and proved to be one of the best teams in the world.
During his Wargame/CTF career, he solved over 3,000 tasks, taking the 2014 fifth place in the global individual WeChall.net ranking and first place (as a member of Dragon Sector) in the overall ctftime.org ranking.
From 2011-2014, he co-organized Holiday Multidisciplinary Workshops, where he conducted training, e.g. in programming in WinAPI, web application security, privilege escalation, and attacks on incorrect implementations of cryptographic algorithms.
After graduating from school in 2014 began his career as a penetration tester, during which he was actively involved in advanced topics such as Red Teaming, fat client reverse engineering, and malware analysis.
From 2019 he worked as a DevOps, trainer at HackingDept, where he willingly shared his extensive knowledge and experience.
Dominik Kostecki "dominikoso"
An IT enthusiast from an early age, friends with the terminal since elementary school, he set a course on cybersecurity already in high school. Currently, he specializes in researching and attacking mobile applications, but he does not let go when new challenges appear. A fan of a creative approach to learning and sharing knowledge. In his free time, he prepares CTF tasks for himself and others. He likes the self-hosted course, often poking around in his infrastructure, learning new things, and breaking and repairing his "toys". Hacking is not only a job for him but also a form of entertainment that allows him to develop his skills and satisfy his curiosity. Professionally a Pentester at STM Cyber, and privately a player of the leading Polish CTF teams p4team and Poland Can Into Space coalition.
Jakub Sajniak "kubolos231"
He has liked to click on the computer since he can remember, once a competitive player, currently a pentester. He has always liked numbers, rankings, and competition in every sport, e-sport, or profession. According to him, client-side attacks are the most interesting, which is often criticized by colleagues. On weekends, he is a member of the P4 team, where he focuses on Web tasks, and in his free time, he makes the Internet safer as a Bug Bounty hunter. Currently, he is a pentester at STM Cyber.
Adam Kliś "Bonus"
Formerly a programmer, today an electronics engineer and researcher, familiar with a wide range of fields - from JS in the browser, through operating systems to transistors. He attacks where others don't expect. While programmers are busy fixing vulnerabilities, it wreaks havoc on the network by hijacking routers. In his spare time from hacking, he deals with network configuration, DevOps, sports, and computer games. At weekends he is a member of the CTF p4 and Poland Can Into Space teams.
Jakub Brzozowski "redfr0g"
Passionate about cybersecurity, computers, and Star Wars. For many years, it has been making the Internet safer by reporting bugs in popular software and participating in Bug Bounty programs. Once a member of the Red Team project team, now a pentester and security researcher at STM Cyber who loves to stare at code for hours to find a bug. When he is not in front of the computer, he can most often be found on a climbing wall or with a book and a cup of hot coffee.
Paweł Żurek "jumper"
A music-addicted idealist who likes to constantly discover and learn new things. In high school, he realized that breaking software is much more interesting than creating it. For over 3 years, he has been a pentester at STM Cyber, where he tries to make the internet a little safer. In his free time, he sits with his nose in books, plays the piano, and occasionally longboards.
Hoang Nguyen Việt "nerozume"
He can do something with computers. He likes to spoil the software and humor of other people. Professionally a pentester at STM Cyber. If there is a need, he speaks Polish.
Professionally, he develops at STM Cyber, where he has been finding vulnerabilities in web, mobile, and infrastructure applications for over a year. After finishing work, he will probably go to the kitchen, where instead of clicking on the computer, he will prepare cinnamon buns or banana bread.
Jan Czerlunczakiewicz "Czerlun"
Passionate about offensive cybersecurity. He spends a lot of time looking for vulnerabilities on platforms such as HackTheBox or Bug Bounty, where he tests and improves his skills. In his free time, you can meet him on the bachata dance floor, where he at least tries to dance to the rhythm. In addition, he loves competition and intellectual challenges, so he will play both chess as well as football.
Bartosz Śmigielski "glasn0st"
He has been dealing with computers since he was a child. I used to set up Tibia servers on Hamachi for my friends, and then create simple websites and scripts in PHP. He worked on a helpdesk as a Linux administrator while pursuing his interest in hacking. He has been professionally involved in security and security cracking for 3 years and is still passionate about the Penguin system and cloud computing. Apart from hacking, he maintains his server infrastructure, devours new cinematography works, and cooks or enjoys music production.