Ad-hoc Research & Offensive Innovation

Deep technical research, reverse engineering, and exploit development for organizations that need to understand emerging threats before they materialize. 8 specialized research capabilities across IoT, defense, and automotive sectors.

Research-Driven Security

Not every security challenge fits neatly into a pentest or red team engagement. Our ad-hoc research capabilities address the complex, novel, and unconventional security questions that require deep technical investigation and original offensive thinking.

From reverse engineering proprietary protocols to developing proof-of-concept exploits for zero-day vulnerabilities, we bring the same operator expertise that powers our IBEX35 red team engagements to problems that demand original research.

8 Research Disciplines

Reverse Engineering

Binary analysis, firmware extraction, protocol reverse engineering, and decompilation of proprietary software to identify security weaknesses and hidden functionality in closed-source systems.

Fuzzing & Vulnerability Discovery

Automated and manual fuzzing campaigns targeting binary protocols, file parsers, network services, and API endpoints to discover exploitable crashes and memory corruption vulnerabilities.

Exploit Development

Full exploit chain development from vulnerability discovery through weaponization — including bypass of modern mitigations (ASLR, DEP, CFG, stack canaries) and integration with our QUIMERA obfuscation framework.

IoT & Embedded Security

Hardware hacking, firmware analysis, JTAG/UART/SPI access, radio frequency analysis, and security evaluation of embedded systems and IoT devices deployed in industrial and healthcare environments.

Defense & Automotive

Specialized offensive evaluation for defense and automotive sectors — CAN bus analysis, V2X security, weapon system assessments, and classified environment testing under strict operational protocols.

CVE Generation & Disclosure

Responsible vulnerability disclosure, CVE assignment coordination, and publication of security advisories documenting novel attack techniques. Building your organization's security credibility.

Offensive Tool Evaluation

Independent evaluation of commercial and open-source offensive security tools — testing efficacy, detection rates, and operational reliability under realistic red team conditions.

Whitepapers & Technical Publications

Detailed technical documentation of research findings, novel attack techniques, and mitigation strategies — written for both technical and executive audiences with academic rigor.

Let's explore it together.

Tell us about your research needs. If it involves breaking, bypassing, or understanding security — we can help.

Get in Touch