Skip to Main Content

Luke Bremer

Senior Security Consultant II

EXPERIENCE
Luke Bremer has 12+ years of Security and IT experience and has worked with and written applications in .NET and .NET Core. Luke specializes in web application development and web application penetration testing to demonstrate basic and advanced tactics that help identify security issues in web applications, web APIs, and connected web services.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Computer Science, Davenport University
  • OSWA
  • SEC+

INDUSTRY CONTRIBUTIONS
Luke has set up static and dynamic code scanners and written secure coding documentation and remediation guides, published several blogs on various security topics, and reported several zero-days in open source software.

PASSION FOR SECURITY
Luke has always had a passion for exploring and securing technology for himself and others. He is part of CTF and bug bounty programs, including TryHackMe, Hack The Box, HackerOne, and has been in the Burp Suite Academy top 50.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog November 28 2023

What is Hackvertor (and why should I care)?

What’s Hackvertor and why should I care?Years ago, Gareth Heyes created a Burp Suite (Burp) extension called Hackvertor. It’s an extension with a lot of…

Read about this article
Blog August 31 2023

Crafting Emails with HTML Injection

Have you ever wanted to send an email from a domain you don’t have SMTP credentials for? With some HTML injection, we may be able to do just that. From time to…

Read about this article
Blog May 23 2023

JavaScript Essentials for Beginning Pentesters

JavaScript is heavily used in almost all modern web applications. Knowing how to format a .js file, set breakpoints, and alter a script's logic on the fly can…

Read about this article
Blog May 02 2023

Cross Site Smallish Scripting (XSSS)

Having small XSS payloads or ways to shorten your payloads ensures that even the smallest unencoded output on a site can still lead to account compromise. A…

Read about this article
Blog October 27 2022

How to Get the Most Out of Your Pentest

TL;DR Define the goal of an assessment.Take time to choose the right assessment type.The more detail you give about an asset, the better quality your report…

Read about this article
Webinars January 15 2025

DOD Contract Compliance: DFARS 7012 and CMMC

Advisory Compliance Practice Lead Chris Camejo will take a deep dive into the Department of Defense requirements for protecting FCI and CUI.

Read about this article
Blog January 07 2025

Solving NIST Password Complexities: Guidance From a GRC Perspective

Not another password change! Isn’t one (1) extra-long password enough? As a former Incident Response, Identity and Access Control, and Education and Awareness…

Read about this article
Podcasts December 20 2024

Security Noise - Episode 7.8

Farewell 2024

Read about this article
Blog December 19 2024

Malware Series: Process Injection Mapped Sections

We're back with another post about common malware techniques. This time, we are talking about using shared memory sections to inject and execute code in a…

Read about this article
Webinars December 18 2024

The Lost Underground

Join TrustedSec Principal Security Consultant Mike Felch for an eye-opening journey into the lost underground, where ingenuity, disobedience, and complexity…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.