Domains

The four pillars of offensive security.

4 pages in this category.


  • Exploit Development — Turning a bug into a reliable, mitigation-aware weapon.
  • Penetration Testing — Scoped, time-boxed assessments that find and demonstrate exploitable weaknesses against a defined target.
  • Red Teaming — Adversary-emulation operations that test detection and response, not vulnerability coverage.
  • Vulnerability Research — Finding unknown bugs in software, hardware, and protocols — and characterizing them well enough to fix or weaponize.