Young hacker smiling



System where all the project’s stakeholders come together. It aims to bring the hacker and the developer closer together, besides giving the ability to remediate reported vulnerabilities in an effective manner.

Web browser window
Icon made by Alfredo Hernandez from Flaticon
Magnifying glass finding error in document
Icon made by Freepik from Flaticon


Engine to automate the closing of security findings over execution environments. It can be executed in computers running OS Windows or Linux, and it can also be included in your Continuous Integration environment.


Set of requirements used to parameterize a pen test. These rules determine how rigurous a pen test really is, by defining what is going to be tested, and what is going to be considered a vulnerability.

Icon made by Smashicons from Flaticon
Icon made by Smashicons from Flaticon


Set of detailed procedures which allow the development of secure applications, secure configuration of technological components, and remediation of vulnerabilities found and reported by us.


Cyberweapon developed entirely by us for in-depth penetration of work stations and critical servers during pen tests.

Command Line Interface
Icon made by Freepik from Flaticon

Service status - Terms of Use