R&D & Tooling
From vulnerability research to custom-built security tools.
HDW Sec runs a laboratory of offensive research and security development experts — to audit your software, strengthen your defences, or equip your teams with tailored analysis tools.
Vulnerability Research
Compromise before the attackers do
Our R&D department analyses software used by organisations to identify exploitable vulnerabilities before they are discovered by malicious actors. Workstations, hardware, servers — no scope is out of reach.
Examples of engagements
- Compromise of the Netskope security agent deployed across all user workstations
- Arbitrary code execution on Foxit Reader, MuPDF and Mozilla Firefox
- Arbitrary code execution on network hardware
- Bypass of machine encryption
Terms of engagement
- Execution of the audit
- Report detailing identified vulnerabilities and countermeasures
- Proof of concept for each identified vulnerability
- Client debrief
Tool Development
Security tools designed for your needs
HDW Sec adapts to client requirements by developing custom security tools on demand — whether defensive solutions to protect your infrastructure or offensive tools to support Red Team engagements.
Defensive tools available
Cywise
Automated penetration testing platform designed to accompany a pentest by continuously maintaining your security posture. Cywise simulates attacks on a regular basis and measures the evolution of your exposure level.
Gargantum
Dark web monitoring platform. Gargantum continuously monitors your organisation's credentials on the dark web and alerts you as soon as they appear — before attackers can exploit them.
Examples of Red Team tools developed
- Hardware implant delivering remote access to a network
- Advanced backdoor
- Interception and decryption tool for encrypted data
- Password leak verification platform
Terms of engagement
- Delivery of the tool and associated documentation
- Training on tool usage
- One year of support included
- Option to develop additional modules on request
A specific security need?
Our experts assess your context and propose an engagement or tool tailored to your objectives.