who are we?

quintessence is a team specialized in cybersecurity, dedicated to detecting and responding effectively to its clients' vulnerabilities before they can be exploited by malicious actors.

we actively parcipitate in the cybersecurity community with contributions to open source projects, so far we have reported 15+ vulnerabilities to companies, 10+ secret leaks and we proactively reported multiple security incidents.

been contacted by us? read more about our mission and motivations here.
you can also discover an example audit report to understand our approach.


our accomplishments

- and other entities who wish to remain anonymous

our skills

audits

we conduct thorough audits of your codebase to find complex vulnerabilities, evaluating each component to ensure the resilience and security of your applications.

consulting

our team assists you in implementing tailored security strategies adapted to your sector. by working closely with your development teams, we establish preventive practices to minimize the risks of breaches and anticipate threats.

pentest

our intrusion testing experts simulate real attacks to test the robustness of your infrastructures against malicious actors. each penetration test is designed to reveal and remedy vulnerabilities before they can be exploited.

monitoring

we provide continuous monitoring of cybercriminal forums on the clear web and the dark web to quickly detect any malicious activity. this proactive surveillance allows us to optimize incident response and minimize the impact of attacks as much as possible.


our values

confidentiality

we guarantee confidentiality with encrypted communications via pgp and accept any confidentiality clauses you may propose.

transparency

we detail every minute of work and provide a daily report to ensure complete visibility of our actions.

security

all our emails are signed with pgp to prevent forgery. our audit reports are end-to-end encrypted, and we only store information essential for billing our clients. all our researchers use LUKS encrypted devices with the AES-256-XTS cipher.

access our public keys here

hacktivity

name description date
iCPCNBoiYV leaked secret reported
IwGQGk vulnerability reported
qwgbgsonT vulnerability reported
UuRz leaked secret reported
ccODIRjUz vulnerability reported
Base for Music vulnerability reported
50inTech leaked secret reported
But public disclosure
Fleet leaked secret reported
OBNuYnYLjDi vulnerability reported
ItIPJ leaked secret reported
nyDFBtRuJftigBup vulnerability reported
dFAQtrz vulnerability reported
koWbTgZ vulnerability reported
Blissim vulnerability reported
But vulnerability reported
Kidygo vulnerability reported
uEzfQ NPS: 9
cWUOP audit report written
qDpKB pentesting
vBaqC vulnerability reported

follow us on bluesky / X