Include Security

Simply stated: Give us any kind of app and we'll hack it better than the rest.

Our clients include awesome tech companies in Silicon Valley, NYC, and beyond.

2025-04-17

Do you use or exploit WebSockets? Check out our new blog post to see how modern browsers may (or may not) be protecting you from Cross-Site WebSocket Hijacking!

blog.includesecurity.com/2025/

2025-03-13

New research🤩 on old tech👴! Our team's latest blog post demonstrates many ways memory vulnerabilities can occur in your legacy Delphi code despite being described as a "memory safe" language by the NSA.
blog.includesecurity.com/2025/

2024-11-20

New blog! Join us as we explore seemingly safe but deceptively tricky ground in Elixir, Python, and the Golang standard library. Well-documented behavior is not always what it appears!
blog.includesecurity.com/2024/

2024-09-18

Who hacks the hackers? We do!

Our new research on vulns in C2 frameworks used by netpen and red teams.
blog.includesecurity.com/

2024-04-25

Fresh blog post for ya!

We introduce coverage-guided fuzzing as a concept to hunt down bugs faster via modification of the Fuzzilli fuzzer from Google Project Zero.

blog.includesecurity.com/2024/

2024-04-04

We're glad everybody enjoyed our April fool's joke for 2024. See you can be serious about security but also have fun!

2024-04-01

We released our new semgrep rules today. Given the recent news about executive orders from the Whitehouse, we thought it would be important to flag all of the code that doesn't meet federal standards.

Memory Safety is serious stuff today:
github.com/IncludeSecurity/Mem

#semgrep #security #memorysafety #rust #c #cpp #illegalcode

2024-03-18

The new
@OpenSecurityTraining2 website went up today.

We're happy to support great open/free security training to get more folks into our industry. If you want to learn low-level RE/hacks/OS check out OST2! ost2.fyi/Home.html

2024-03-13

We're still seeing a lot of Ruby code out there in the tech world. If we see it we hack it! Latest blog post on advanced deserialization gadget chains for exploitation of Ruby applications is up.

blog.includesecurity.com/2024/

2024-03-13

Oh Hi Mastodon world. We're IncludeSec.
IncludeSecurity.com

We like to talk about hacking stuff.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst