Penetration Testing

Our team consists of specialized security researchers who routinely uncover critical vulnerabilities in commercial software. We regularly demonstrate our expertise at events like Pwn2Own and share our knowledge as trainers at international conferences. Leverage this expertise to put your product's security to the test.

Our Certificates

  • OSCE3
  • OSCP
  • PNPT
  • OSEP
  • OSEE
  • CRTP
  • TISP
  • OSED
  • CRTO
  • CISSP
  • GMON
  • OSWE
  • OSCE3
  • OSCP
  • PNPT
  • OSEP
  • OSEE
  • CRTP
  • TISP
  • OSED
  • CRTO
  • CISSP
  • GMON
  • OSWE
Workcation

“The collaboration with Neodyme is always professional and uncomplicated. We appreciate the fast communication channels and efficient processes. The employees are competent and distinguish themselves through high creativity. Here you also think outside the box!”

Moritz Prinz
Partner at TNG Technology Consulting

Find more content in our blog

Our blog features posts from the world of cybersecurity, reverse engineering, research projects, solana and other blockchains, cryptography, and much more. If you're a developer, a security professional, or just an interested person, we are sure you will find something exciting to read! Here are some of our favorite posts to get you started!

Pwn2Own Ireland 2024: Canon imageCLASS MF656Cdw

This blogpost starts a series about various exploits at Pwn2Own 2024 Ireland (Cork). This and the upcoming posts will detail our research methodology and journey in exploiting different devices. We start with some EXIF basics and end up with shellcode execution after reconfiguring the MMU of the RTOS.

HTML to PDF Renderer: A tale of local file access and shellcode execution

In a recent engagement, we found an HTML to PDF converter API endpoint that allowed us to list local directories and files on a remote server. One of the PDF files we created, revealed that the converter was using a .NET renderer framework based on Chromium 62. With this, we were able to gain remote code execution by porting a Chromium 62 exploit to the particular version of the renderer.

Safeguard your enterprise with the expertise of our research team.

Book your free pentest scoping call!