Penetration Testing

Leverage real-world hacking expertise to strengthen your organization's defenses. Our team consists of seasoned hacking competition champions and certified security researchers. We deliver thorough assessments of your systems using both manual and semi-automated methods.

Our Certificates

  • OSCP
  • OSWE
  • OSEP
  • CISSP
  • CEH
  • GMON
  • TISP
  • CRTO
  • PNPT
  • CRTP
  • OSCP
  • OSWE
  • OSEP
  • CISSP
  • CEH
  • GMON
  • TISP
  • CRTO
  • PNPT
  • CRTP
Workcation

“The collaboration with Neodyme is always professional and uncomplicated. We appreciate the fast communication channels and efficient processes. The employees are competent and distinguish themselves through high creativity. Here you also think outside the box!”

Moritz Prinz
Partner at TNG Technology Consulting

Find more content in our blog

Our blog features posts from the world of cybersecurity, reverse engineering, research projects, solana and other blockchains, cryptography, and much more. If you're a developer, a security professional, or just an interested person, we are sure you will find something exciting to read! Here are some of our favorite posts to get you started!

Pwn2Own Ireland 2024: Canon imageCLASS MF656Cdw

This blogpost starts a series about various exploits at Pwn2Own 2024 Ireland (Cork). This and the upcoming posts will detail our research methodology and journey in exploiting different devices. We start with some EXIF basics and end up with shellcode execution after reconfiguring the MMU of the RTOS.

HTML to PDF Renderer: A tale of local file access and shellcode execution

In a recent engagement, we found an HTML to PDF converter API endpoint that allowed us to list local directories and files on a remote server. One of the PDF files we created, revealed that the converter was using a .NET renderer framework based on Chromium 62. With this, we were able to gain remote code execution by porting a Chromium 62 exploit to the particular version of the renderer.

The Key to COMpromise - Pwning AVs and EDRs by Hijacking COM Interfaces, Part 1

In this series of blog posts, we cover how we could exploit five reputable security products to gain SYSTEM privileges with COM hijacking. If you’ve never heard of this, no worries. We introduce all relevant background information, describe our approach to reverse engineering the products’ internals, and explain how we finally exploited the vulnerabilities. We hope to shed some light on this undervalued attack surface.

Secure your business.
Take the right step today.

You want to improve your product's or organization's security? Request a free pentest needs assessment!