Workspaces
Hive. Red Team
Apiary. Blue Team
Pricing
Downloads
Resources
Research
Updates
Blog
Whitepapers
Use cases
Why PTaaS?
Docs
Book demo
Latest researches about founded vulnerabilities and how you can try to play with them
The short story about Clubhouse user scraping and social graphs
TL;DR During this RedTeam testing, we used Clubhouse as a social engineering tool to find out more about our client's employees. UPDATE: While we were preparing this article for publication,
...
r00kie-kr00kie. Exploring the kr00k attack
TL;DR We created and published a PoC exploit of the kr00k attack (CVE-2019-15126): https://github.com/hexway/r00kie-kr00kie All technical details can be found in the Process section. INTRODUCTION AND MOTIVATION In February 2020,
...
Piercing the Shield. Breaking the FunctionShield cloud security library
TL;DR We've found a vulnerability in FunctionShield, a cloud security library, that allows bypassing its tightest restrictions completely. All technical details can be found in the "Process" section. Cloud computing
...
Apple bleee. Everyone knows What Happens on Your iPhone
Users value their privacy, and Apple understands that. We even see related PR activities. "What happens on your iPhone, stays on your iPhone." Let's see if it's true. TL;DR If
...
Try Hexway online
Online demo
Copyright © 2022 Hexway.
All rights reserved
Workspaces
Hive
Apiary
Roadmap
Explore
Pricing
Downloads
Docs
Resources
Blog
Research
Privacy policy
Stay up to date
Greate!
Check your mail
See
Hexway
in action
It would be nice if you told a little more about yourself
I agree to the processing of my personal data
Receive hot cybersecurity news and useful materials
Thank you for your
demo request!
We will be happy to see you as our future user!
Back to hexway
Hot in blog
Automating Pentests: How to Optimize...
Is it okay to rely heavily on automated tools to perform pentests? Or using tools beyond a certain extent can backfire? Let’s answer these questions in this article, as we
...
Request
price
It would be nice if you told a little more about yourself
I agree to the processing of my personal data
Receive hot cybersecurity news and useful materials
Such a
pleasure
to hear from you!
We will answer as soon as possible.
Back to hexway
Hot in blog
Automating Pentests: How to Optimize...
Is it okay to rely heavily on automated tools to perform pentests? Or using tools beyond a certain extent can backfire? Let’s answer these questions in this article, as we
...
O-oh, you're using mobile device instead of desktop 😕
Come back later from your PC to try all of our features!
I still want to
check out demo
, even if it can be crooked