“I have had the pleasure of working with Dejan and can confidently say that Dejan is a true expert in the C\C++ and low-level Windows operating system internals. His expertise, including security aspects and reverse engineering, sets Dejan apart from others in the field. He has a passion for delivering high-quality software and is dedicated to security aspects of the applications. Dejan has a keen eye for detail that allows him to be a valuable asset to any project, bringing a wealth of knowledge and experience to the table. I wholeheartedly endorse Dejan for any role that requires expertise in C++ development and low-level Windows operating system knowledge.”
| CARVIEW |
Sign in to view Dejan’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Dejan’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Slovenia
Sign in to view Dejan’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
3K followers
500+ connections
Sign in to view Dejan’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Dejan
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Dejan
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Dejan’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
Sign in to view Dejan’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
-
Is React2Shell the modern-day Log4J? Raven's Chief Research Officer, Omer Yair and Senior Researcher, Dejan L. break down CVE-2025-55182 and why this…
Is React2Shell the modern-day Log4J? Raven's Chief Research Officer, Omer Yair and Senior Researcher, Dejan L. break down CVE-2025-55182 and why this…
Liked by Dejan L.
-
Other than execution flow, React2Shell leaves no trace - no logs, memory footprint is minimal and even that is ephemeral. The only method today that…
Other than execution flow, React2Shell leaves no trace - no logs, memory footprint is minimal and even that is ephemeral. The only method today that…
Liked by Dejan L.
-
🚨 React Meltdown (CVE-2025-55182) is the lately discovered RSC vulnerability - and WAF rule patches are not enough. Our very own Dejan L. and Yanna…
🚨 React Meltdown (CVE-2025-55182) is the lately discovered RSC vulnerability - and WAF rule patches are not enough. Our very own Dejan L. and Yanna…
Liked by Dejan L.
Experience & Education
-
Raven.io
****** ******** ********
-
******* ********
**** ******* ********* ******* *******
-
********** ** ********** ******* ** ******** *** *********** *******
******** ****** **** ***** ** ******** ******** *********** undefined
-
-
********* *****
-
-
View Dejan’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Publications
-
Negative Testing
https://eprints.fri.uni-lj.si/1791/1/Lukan-1.pdf
See publicationIn the thesis we presented the topic on computer security and it’s importance in the modern world. First, we defined the concept of vulnerability and types of vulnerabilities in computer applications. Then we glanced over the area of vulnerability detection in software and described the methods known today. After that we described methods and procedures used in negative testing, which is just one of the methods of vulnerability testing. We found the most interesting tools for negative testing…
In the thesis we presented the topic on computer security and it’s importance in the modern world. First, we defined the concept of vulnerability and types of vulnerabilities in computer applications. Then we glanced over the area of vulnerability detection in software and described the methods known today. After that we described methods and procedures used in negative testing, which is just one of the methods of vulnerability testing. We found the most interesting tools for negative testing and applied them to a sample program Vulnserver and real server programs. We compared the tools Peach and Sulley regarding the performance of vulnerability detection. Finally, we presented how a malicious attacker could exploit found vulnerabilities and take complete control of the attacked computer.
Courses
-
Advanced Ethical Hacking Course
-
-
CCNA Course
-
-
Professional Penetration Testing Course
-
Projects
-
Punch bag
Punch bag is an action game based on your actual movement. In order to play, you need to press Start, then hold the phone in your hand and punch as hard as you can, like you would punch a real punching bag (boxing bag) to get points. While holding your phone, you can punch in any direction you want.
Other creatorsSee project -
Shaking Steve
Steve is a regular middle-aged man, but with one huge problem... He gets sick all the time, especially when he eats junk food.
Try to make him puke as fast as you can by shaking his world!
But be careful! If you shake him, while he's holding the table, you might lose the stars.
Shakin' Steve is a fun game with a simple goal: make Steve vomit.
Shake your phone as hard as you can or give Steve food that makes him sick. The faster he pukes, more points you get…Steve is a regular middle-aged man, but with one huge problem... He gets sick all the time, especially when he eats junk food.
Try to make him puke as fast as you can by shaking his world!
But be careful! If you shake him, while he's holding the table, you might lose the stars.
Shakin' Steve is a fun game with a simple goal: make Steve vomit.
Shake your phone as hard as you can or give Steve food that makes him sick. The faster he pukes, more points you get.
FEATURES:
* FREE to play
* Treats are tempting - Steve releases the table and you can shake him
* Food makes him sick - Various food makes Steve sick even before you start to shake him
* Food is also responsible for the color and contents of puke
* Looks change Steves appearance - Some looks are already available, many more to come!
* Collect stars - With stars you also earn coins!
* Compete with others - Game Center included
Available on the AppStore since December 18th 2012!Other creatorsSee project -
OWASP - Zed Attack Proxy Project
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
Other creatorsSee project -
Zeus Posrednik
- Present
Custom server and client applications for secure file transfer, validation using XSD and transformation of xml files using XSLT.
Customer wanted to transfer data from their internal accounting system to accounting company Računovodski servis Zeus. They had the ability to export xml files, but those were not directly importable into Pantheon accounting.
We developed a server+client application for secure transfer using certificates. Client application checked validity of xml file…Custom server and client applications for secure file transfer, validation using XSD and transformation of xml files using XSLT.
Customer wanted to transfer data from their internal accounting system to accounting company Računovodski servis Zeus. They had the ability to export xml files, but those were not directly importable into Pantheon accounting.
We developed a server+client application for secure transfer using certificates. Client application checked validity of xml file, server transformed received files into format that could be used for import.
Technologies used: C++, Qt, Xerces, XSLT, XSDOther creators -
Master thesis
-
See projectIn the thesis we presented the topic on computer security and it’s importance in the modern world. First, we defined the concept of vulnerability and types of vulnerabilities in computer applications. Then we glanced over the area of vulnerability detection in software and described the methods known today. After that we described methods and procedures used in negative testing, which is just one of the methods of vulnerability testing. We found the most interesting tools for negative testing…
In the thesis we presented the topic on computer security and it’s importance in the modern world. First, we defined the concept of vulnerability and types of vulnerabilities in computer applications. Then we glanced over the area of vulnerability detection in software and described the methods known today. After that we described methods and procedures used in negative testing, which is just one of the methods of vulnerability testing. We found the most interesting tools for negative testing and applied them to a sample program Vulnserver and real server programs. We compared the tools Peach and Sulley regarding the performance of vulnerability detection. Finally, we presented how a malicious attacker could exploit found vulnerabilities and take complete control of the attacked computer.
The thesis is available here: https://eprints.fri.uni-lj.si/1791/1/Lukan-1.pdf
The Peach PIT files were also published on the Peach website and they are accessible here: https://peachfuzzer.com/PublicPits
Honors & Awards
-
Zois Scholarships
Slovene human resources development and scholarship fund
Zois scholarships are state merit scholarships, first established in 1986. The basic guideline of the system was detection of gifted children and promotion of development of their careers so they would achieve the highest level of education and thus providing the society with the best human potential. The emphasis was on encouraging and motivating the best students from the very beginning of their careers - from the transition from primary to secondary education. This age group is still in the…
Zois scholarships are state merit scholarships, first established in 1986. The basic guideline of the system was detection of gifted children and promotion of development of their careers so they would achieve the highest level of education and thus providing the society with the best human potential. The emphasis was on encouraging and motivating the best students from the very beginning of their careers - from the transition from primary to secondary education. This age group is still in the focus receiving the largest part of the available funding for the Zois scholarships.
I was receiving it from 2002 to 2012. -
Third place in the Swiss Cyber Storm ||| Hacking Competition
-
Languages
-
English
Native or bilingual proficiency
-
Slovenian
Native or bilingual proficiency
-
German
Elementary proficiency
Recommendations received
More activity by Dejan
-
When the Time-to-Exploit (TTE) is -1, it’s no longer about response, it’s about prevention. With Raven, you can proactively remove unnecessary…
When the Time-to-Exploit (TTE) is -1, it’s no longer about response, it’s about prevention. With Raven, you can proactively remove unnecessary…
Liked by Dejan L.
-
Kako v svetu pametnih naprav in umetne inteligence, prepoznati napredek? Z veseljem sporočam, da je moj izdelek WOOD‘N’ROLL - KOLEBNICA, prejel…
Kako v svetu pametnih naprav in umetne inteligence, prepoznati napredek? Z veseljem sporočam, da je moj izdelek WOOD‘N’ROLL - KOLEBNICA, prejel…
Liked by Dejan L.
-
ICYMI, Latio released their 2025 Cloud Security Market Report and we're so excited to share that Raven has been named a Cloud Security…
ICYMI, Latio released their 2025 Cloud Security Market Report and we're so excited to share that Raven has been named a Cloud Security…
Liked by Dejan L.
-
It was pure pleasure to present at my first Linux-related event!
It was pure pleasure to present at my first Linux-related event!
Liked by Dejan L.
-
Are you coming to OWASP this week? Let's meet up!
Are you coming to OWASP this week? Let's meet up!
Liked by Dejan L.
-
Visiting #OWASP_Global_AppSec in DC? Come visit us at booth SU09! OWASP® Foundation
Visiting #OWASP_Global_AppSec in DC? Come visit us at booth SU09! OWASP® Foundation
Liked by Dejan L.
-
Heading to #OWASP 2025 Global AppSec in Washington DC? Swing by our booth (SU19) to see Runtime Application Security taken to the next level.
Heading to #OWASP 2025 Global AppSec in Washington DC? Swing by our booth (SU19) to see Runtime Application Security taken to the next level.
Liked by Dejan L.
-
Are you coming to OWASP this week? Let's meet up!
Are you coming to OWASP this week? Let's meet up!
Liked by Dejan L.
-
Historic: Nvidia CEO Jensen Huang just hand-delivered the world’s smallest AI supercomputer to Elon Musk at SpaceX 😳 Just hours before Starship…
Historic: Nvidia CEO Jensen Huang just hand-delivered the world’s smallest AI supercomputer to Elon Musk at SpaceX 😳 Just hours before Starship…
Liked by Dejan L.
-
I had the honor today of Cippi attending my „C++ Software Design“ workshop at NDC TechTown 😊 I have to admit, though, that I had the constant…
I had the honor today of Cippi attending my „C++ Software Design“ workshop at NDC TechTown 😊 I have to admit, though, that I had the constant…
Liked by Dejan L.
-
The AI Security acquisition spree continues with Aim Security and Cato Networks for around $300 million. Some thoughts below: 1. As we outlined in…
The AI Security acquisition spree continues with Aim Security and Cato Networks for around $300 million. Some thoughts below: 1. As we outlined in…
Liked by Dejan L.
-
Our Chief Research Officer Omer Yair and Martin Torp, co-founder of Coana (acquired by Socket) discuss the difference between static and runtime…
Our Chief Research Officer Omer Yair and Martin Torp, co-founder of Coana (acquired by Socket) discuss the difference between static and runtime…
Liked by Dejan L.
-
Just spent a few weekends trying to implement an Oracle ASM filesystem using dbms_diskgroup.read(). The good: Successfully mapped v$asm_file and…
Just spent a few weekends trying to implement an Oracle ASM filesystem using dbms_diskgroup.read(). The good: Successfully mapped v$asm_file and…
Liked by Dejan L.
View Dejan’s full profile
-
See who you know in common
-
Get introduced
-
Contact Dejan directly
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentAdd new skills with these courses
View Dejan’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
LinkedIn is better on the app
Don’t have the app? Get it in the Microsoft Store.
Open the app