Built Different.
Viper Offensive Security is run by a hands-on offensive security engineer with over 15 years of practical attack experience — across embedded systems, Web3 protocols, enterprise networks, and AI systems.
We work with a small number of clients at a time — by design. Every engagement is led by a senior engineer, not handed off to a junior team. No account managers, no revolving door of analysts. When you hire Viper, you get the person who actually does the work.
Credentials
- →15+ years offensive security — embedded systems, Web3 protocol cores, enterprise networks, AI systems
- →Presented at DEF CON and Infiltrate
- →Former: Netherlands Forensic Institute, European unicorn security lead (Bird), national telecom security (KPN)
- →Audited L1/L2 cores: ZetaChain (Cosmos SDK, Evmos, IBC), RootStock (RSKj VM, two-way peg), Linea L2 bridge (ZK-SNARK circuits, proof aggregation), TON, Solana, and Sui consensus and state transition logic
- →Cryptographic primitive audits: Noise protocol, ephemeral key exchange, ratcheting — for Codex, Waku, Nomos, and Status Wallet (Rust, Nim, JS)
- →Custom tooling: Slither detectors, Echidna, Medusa, Halmos, Certora — across EVM, Rust, and Cairo
- →Registered: England & Wales · Operating from the Netherlands
“Most audits find what automated tools catch. We find what they miss.”