Services
Ad-hoc Research & Offensive Innovation
Deep technical research, reverse engineering, and exploit development for organizations that need to understand emerging threats before they materialize. 8 specialized research capabilities across IoT, defense, and automotive sectors.
Overview
Research-Driven Security
Not every security challenge fits neatly into a pentest or red team engagement. Our ad-hoc research capabilities address the complex, novel, and unconventional security questions that require deep technical investigation and original offensive thinking.
From reverse engineering proprietary protocols to developing proof-of-concept exploits for zero-day vulnerabilities, we bring the same operator expertise that powers our IBEX35 red team engagements to problems that demand original research.
Capabilities
8 Research Disciplines
Reverse Engineering
Binary analysis, firmware extraction, protocol reverse engineering, and decompilation of proprietary software to identify security weaknesses and hidden functionality in closed-source systems.
Fuzzing & Vulnerability Discovery
Automated and manual fuzzing campaigns targeting binary protocols, file parsers, network services, and API endpoints to discover exploitable crashes and memory corruption vulnerabilities.
Exploit Development
Full exploit chain development from vulnerability discovery through weaponization — including bypass of modern mitigations (ASLR, DEP, CFG, stack canaries) and integration with our QUIMERA obfuscation framework.
IoT & Embedded Security
Hardware hacking, firmware analysis, JTAG/UART/SPI access, radio frequency analysis, and security evaluation of embedded systems and IoT devices deployed in industrial and healthcare environments.
Defense & Automotive
Specialized offensive evaluation for defense and automotive sectors — CAN bus analysis, V2X security, weapon system assessments, and classified environment testing under strict operational protocols.
CVE Generation & Disclosure
Responsible vulnerability disclosure, CVE assignment coordination, and publication of security advisories documenting novel attack techniques. Building your organization's security credibility.
Offensive Tool Evaluation
Independent evaluation of commercial and open-source offensive security tools — testing efficacy, detection rates, and operational reliability under realistic red team conditions.
Whitepapers & Technical Publications
Detailed technical documentation of research findings, novel attack techniques, and mitigation strategies — written for both technical and executive audiences with academic rigor.
Have a Unique Challenge?
Let's explore it together.
Tell us about your research needs. If it involves breaking, bypassing, or understanding security — we can help.
Get in Touch