About Martin Haunschmid

The moment is always the same: When I introduce myself in a lecture, one line of my career summary causes confusion: Studies in Communication. However, it quickly turns out to be a great strength: I dare to claim to be one of the few technicians who can really bring technical topics to the point well, appealingly, and entertainingly.

Technical finesse alone only gets you so far until management has to approve โ€“ or it's about training end-users.

My philosophy is therefore: Bringing technology out of the ivory tower. Only in this way can we meet the challenges of the coming years.

The situation in IT security is... not good, rather like fighting windmills. That doesn't stop me from doing my part. To make companies safer, to give hackers fewer chances, and to make the Internet what it was actually meant to be:

Cat videos.


My first "Virus"

Just recently, I found my first programming attempts on an ancient hard drive. The file named virus.vbs immediately catches the eye. In it? A program that the 15-year-old Martin then called a "virus".

At that time, I first learned how my program can open other programs. And the first idea I have is: What happens if I open hundreds of Windows Explorers on my 500MHz computer?

The computer crashes, that's what happens. SDOS โ€“ Self-inflicted Denial of Service, so to speak.

I'm glad I didn't embark on the path of hacking at 15. Today, the activity is an entire industry, you can help people and make money. With solid values, and convinced to stay on the good side.

At the beginning of my entrepreneurial activity, a website that was in development with us was played on our test server.

4 days later, it was hacked, and we were blocked by the host.

A password found its way onto the Internet that should not be on the Internet. That was a considerable learning for me โ€“ I have adapted the processes so that our local development sites are already created with secure passwords.

But much more interesting for me was: How the hackers tried to make money from the site. For hours, without eating or drinking, I tried to trace the hack via log files. A switch flipped, and I had to know what happened. This detective work was so exciting that I shortly afterwards decided: IT security will be my life's work.

Getting Hacked


Skill Tree

Becoming the Peter Filzmaier of IT Security ๐Ÿ“บ


Become a LinkedIn Top Voice

Am I an influencer now?

Get tweeted by Armin Wolf

Played through Austria

Appeared on ZiB2

Fame achieved

Mentioned in Krone (positively)

Grandma, I'm in the newspaper

Earn money with YouTube

A cent is a cent

Influencer Level 1


Influencer Level 2


Influencer Level 3


Skill Tree

Hackerman ๐Ÿ‘พ


Can exit VIM Editor





Do you enjoy suffering?


Why are you doing this to yourself?

HackTheBox Rank: Pro Hacker

Getting there

HackTheBox Rank: Elite Hacker

Too much free time?

HackTheBox Rank: Guru

The Buddha of Hacking

HackTheBox Rank: Omniscient

Godmode: On.

Research I

Received first CVE

Research II

3 CVEs

Bug Bounty I

Received first bounty

Bug Bounty Level 2

Received 10,000 in bounties

Bug Bounty Level 3

Received 100,000 in bounties

Skill Tree

Random ๐Ÿ’ฉ


The Assassin

Almost deleted a productive database

Generate Passive Income

A euro is a euro

But why!?

When automation takes longer than the task itself

Not Sued 2020

Not controversial enough?

Not Sued 2021

Not controversial enough?

Not Sued 2022

Not controversial enough?

Not Sued 2023

Not controversial enough?

Not Sued 2024

Not controversial enough?

The Dropout

Something with alpacas

How I Help

My goal is to create real understanding (and to spread a little fear ๐Ÿค“). Only those who truly understand the threats to their own company can make good decisions.

At the same time, of course, I am also aware that IT security should contribute to the company's purpose rather than paralyze it.

In all my actions, I therefore pursue a pragmatic approach aimed at transparency, understanding, and communication at eye level.

"We don't rise to the level of our expectations, we fall to the level of our training."

- Archilochus

Contact now!

This site uses reCAPTCHA. Google Privacy Policy and Terms and Conditions.

...or directly to the initial consultation:

In the initial consultation, you will get to know me and my philosophy, and we will briefly discuss how I can help you. So you and your company:

  • Become safer
  • Are quickly operational again in extreme cases
  • Don't have to be relieved with every article about hacking, glad that it wasn't you this time
Book a free initial consultation now!