Every discovery fuels the next breakthrough, turning real-world research into smarter tools and stronger security.
Our team explores the unknown — discovering vulnerabilities, building exploits, and creating tools that redefine what’s possible in offensive security.



Optimize vulnerability management, streamline pentest reporting, and integrate DevSecOps into your workflows with Faraday.
evilDoggie is the offensive firmware variant of Doggie, tailored for automotive security research and low-level CAN Bus manipulation.
This is a tool designed for Open Source Intelligence (OSINT) purposes, which helps to gather information about employees of a company.
A security research toolkit exposing hidden risks in DrayTek edge devices and closed-source firmware.
Identify vulnerabilities, misconfigurations, and security issues in seconds. Our platform provides DNS security testing with detailed findings and remediation guidance.
Our discoveries are reported to vendors and shared with the community under coordinated disclosure. Because true security only grows through collaboration and transparency.
Our security research team actively investigates vulnerabilities in widely used technologies, with a strong focus on network infrastructure and embedded systems. Throughout 2024, our researchers reported multiple security issues affecting
Cada año, la Ekoparty nos recuerda por qué amamos lo que hacemos.Nos preparamos con la misma energía de siempre: para reencontrarnos con la comunidad, compartir lo que investigamos, aprender de otros y,
Gabriel Franco is our Head of Cybersecurity Services and introduces this new open-source tool, presented at Black Hat Arsenal. Emploleaks enables the collection of personal information using Open Source Intelligence
Faraday researchers actively contribute to international conferences and security events — sharing discoveries, tools, and methodologies that advance the field.
Are you a researcher, ethical hacker, or security enthusiast?
Collaborate with Faraday or join our Research Lab to push the boundaries of security innovation.