who are we?

quintessence is a team specialized in cybersecurity, dedicated to detecting and responding effectively to its clients' vulnerabilities before they can be exploited by malicious actors.

we actively parcipitate in the cybersecurity community with contributions to open source projects, so far we have reported 15+ vulnerabilities to companies, 10+ secret leaks and we proactively reported multiple security incidents.

been contacted by us? read more about our mission and motivations here.
you can also discover an example audit report to understand our approach.


our accomplishments

- and other entities who wish to remain anonymous

our skills

audits

we conduct thorough audits of your codebase to find complex vulnerabilities, evaluating each component to ensure the resilience and security of your applications.

consulting

our team assists you in implementing tailored security strategies adapted to your sector. by working closely with your development teams, we establish preventive practices to minimize the risks of breaches and anticipate threats.

pentest

our intrusion testing experts simulate real attacks to test the robustness of your infrastructures against malicious actors. each penetration test is designed to reveal and remedy vulnerabilities before they can be exploited.

monitoring

we provide continuous monitoring of cybercriminal forums on the clear web and the dark web to quickly detect any malicious activity. this proactive surveillance allows us to optimize incident response and minimize the impact of attacks as much as possible.


our values

confidentiality

we guarantee confidentiality with encrypted communications via pgp and accept any confidentiality clauses you may propose.

transparency

we detail every minute of work and provide a daily report to ensure complete visibility of our actions.

security

all our emails are signed with pgp to prevent forgery. our audit reports are end-to-end encrypted, and we only store information essential for billing our clients. all our researchers use LUKS encrypted devices with the AES-256-XTS cipher.

access our public keys here

hacktivity

name description date
flLoOV vulnerability reported
oIsROjFUH vulnerability reported
eHUC leaked secret reported
ruXevhXUY vulnerability reported
Base for Music vulnerability reported
50inTech leaked secret reported
But public disclosure
Fleet leaked secret reported
qqErPqvXTPW vulnerability reported
mbvHE leaked secret reported
ljTFURCRtITaQEsU vulnerability reported
MSpLvbT vulnerability reported
nmBolUH vulnerability reported
Blissim vulnerability reported
But vulnerability reported
Kidygo vulnerability reported
EUujL NPS: 9
BPuKv audit report written
Frcrn pentesting
EecUQ vulnerability reported

follow us on bluesky / X