Vulnerability Research
We investigate unknown vulnerabilities across operating systems, browsers, and the software you ship — uncovering bugs before adversaries do.
// 0-day discoveryPKSecurity is a vulnerability research company that discovers security flaws in the world's most-used software — backed by unrivaled creativity and elite technical skill.
Founded by proud, top-notch vulnerability experts, PKSecurity tackles the cutting edge of cyber intelligence. Our researchers analyze vulnerabilities across mobile, desktop, and web applications — with a track record in vulnerability reporting, domestic and international hacking competitions, and Pwn2Own.
We find what others miss — exploit chains, logic flaws, novel primitives.
From kernel internals to JavaScript engines, our researchers dig deep.
The published work is impressive. The unpublished work is something else.
We investigate unknown vulnerabilities across operating systems, browsers, and the software you ship — uncovering bugs before adversaries do.
// 0-day discoveryHigh-quality exploits and proof-of-concept demonstrations engineered to defeat modern mitigations and prove real-world impact.
// weaponized PoCMonthly analysis reports on patched vulnerabilities in commercial software — root cause, exploitation potential, and defensive recommendations.
// monthly intelHands-on hacking and security courses delivered by working researchers — practical curricula for teams that need to think like attackers.
// offensive curriculumPreference for candidates with 1-day exploit development or 0-day discovery experience.
Find and exploit remote code execution paths across the Android attack surface.
Apply →Hunt low-level bugs in the Android kernel and its vendor drivers.
Apply →Audit privileged Android applications and supporting system services.
Apply →Reverse and exploit embedded devices, firmware, and proprietary protocols.
Apply →Long-running international security conference held in Seoul.
An invite-only conference dedicated to cutting-edge offensive research.
Engagements, research collaborations, training inquiries, or just to introduce yourself — we read every message.