Domains
The four pillars of offensive security.
4 pages in this category.
- Exploit Development — Turning a bug into a reliable, mitigation-aware weapon.
- Penetration Testing — Scoped, time-boxed assessments that find and demonstrate exploitable weaknesses against a defined target.
- Red Teaming — Adversary-emulation operations that test detection and response, not vulnerability coverage.
- Vulnerability Research — Finding unknown bugs in software, hardware, and protocols — and characterizing them well enough to fix or weaponize.
