Charles Adams, CEO and Co-Founder of Exploit Strike LLC

Charles Adams

Charles embarked on his professional journey in 2012 when he enlisted in the United States Marine Corps, specializing in system administration for tactical aviation systems, as well as deploying expeditionary computer and radio networks around the globe.

In 2020, he decided to shift gears and follow his academic dreams, enrolling in a Bachelor of Science program in Computer Science. It was during his studies that he discovered his unwavering passion for offensive cybersecurity, which he has since pursued with dedication: mastery of the art of web, network, and systems exploitation.

Charles graduated from the University of Delaware in 2024. During his last year he led as the President of the Blue Hens Capture the Flag Club to the 3rd ranked team in the United States (CTF Time). He is GFACT, GSEC, GCIH, GPEN and OSCP certified. Additionally, Charles is enrolled as a graduate student at the SANS Technology Institute as part of their Penetration Testing & Ethical Hacking program.

CEO and Co-Founder

Teddy Katayama, CTO and Co-Founder of Exploit Strike LLC

Kaoru Katayama

CTO and Co-Founder

Kaoru Katayama is a doctoral student at the University of Delaware studying Network Defense. He has over a decade of experience in network security (we all think he can breach almost any network).

He has field experience via his time at CISCO, working with local businesses in Delaware performing penetration testing, and competing in national attack-defense simulations.

“Every new system brings with it a multitude of new problems, and there are no machines that can protect against all attacks. In the end, we’re bound by people, not by machines.”

Man wearing glasses and a black polo shirt with an electronic circuit logo, smiling against a white background with a blue border.

Dr. Andrew Novocin

Mentor and Investor

Professor Novocin teaches ethical hacking at the University of Delaware. He coaches their top-ranked Capture The Flag team (highly competitive hacking competitions). He is also the Director of the Cyber Security Scholars program, founder of the Vertically Integrated Projects program, and a well-loved teacher of cryptography, web application security, x86 exploitation, and threat hunting.

As an entrepreneur, he focuses on delivering high quality service through building scalable software for clients. His most rewarding work comes from zeroing in on daily pain points and creating solutions to resolve them. It's truly wealth creation to significantly improve a client’s bottom line and quality of life.

Partner and Senior Penetration Expert

JD Wang

Senior Penetration Expert & Partner

JD Wang’s journey into cybersecurity began with a strong foundation in Computer Science, recently completing the University of Delaware’s Computer Science 4+1 program. During his studies, he developed a deep interest in offensive security and reverse engineering, refining his skills through both academic pursuits and competitive experiences. JD was Co-President of the Blue Hens Capture the Flag Club during 2022-2023 and has been an active member contributing to its participation in national and international CTF competitions. He was also a teaching assistant for Penetration Testing and Reverse Engineering in the Fall of 2023 at the University of Delaware. His certifications include GIAC Foundational Cybersecurity Technologies (GFACT), GIAC Security Essentials (GSEC), GIAC Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), and CompTIA PenTest+.

Partner and Senior Penetration Expert

James Vanyi

Cybersecurity Engineer & Partner

James Vanyi started his career by helping people with financial analysis and trading, using tools and automation to find patterns and make decisions. Over time, he shifted his focus to cybersecurity, where he now examines systems for weaknesses and helps organizations improve their defenses.

He also volunteered as a firefighter with the Jackson Mills Fire Department, where he learned to stay calm and reliable in high-pressure situations. He now works closely with Exploit Strike on security testing projects and business development.