Offensive security & fuzzing research

We break software
so you don’t have to.

F13 Labs is a boutique offensive security and research unit focused on vulnerability discovery, fuzzing, and exploit‑grade analysis for high‑value targets.

Vulnerability research Fuzzing pipelines Binary analysis Protocol abuse
Limited capacity, research‑driven work only. We prefer hard problems.

What we actually do

01 · Vulnerability research

Deep‑dive vulnerability discovery

Targeted research on critical components: parsers, protocol handlers, IPC/RPC bridges, and security boundaries. We combine manual analysis with custom fuzzing infrastructure.

  • Binary & source‑assisted audits
  • Stateful protocol fuzzing
  • Crash triage & deduplication
02 · Fuzzing pipelines

Corpus‑driven fuzzing design

Design and implementation of fuzzing setups, including corpus generation from 010 templates, harness design, and coverage‑guided workflows.

  • 010 template–based corpus generation
  • Coverage‑guided fuzzing strategies
  • CI‑integrated fuzzing pipelines
03 · Exploitability

Exploit‑grade analysis

For high‑value findings, we provide exploitability assessments, proof‑of‑concepts, and hardening recommendations grounded in real attacker workflows.

  • Exploitability triage
  • PoC development
  • Mitigation & hardening guidance

Where we spend our lab time

Fuzzing

AI‑assisted corpus generation

We experiment with integrating LLMs into fuzzing workflows: generating structured corpora from binary templates, mutating edge cases, and guiding coverage exploration.

Binary formats

Complex file & protocol parsers

Focus on proprietary formats, legacy parsers, and complex state machines where traditional fuzzing alone underperforms.

Tooling

Internal tooling & pipelines

Custom harnesses, triage tooling, and analysis scripts built around real‑world targets—not generic demos.

We’re a good fit if you care about…

High‑value attack surface

Security boundaries, privilege transitions, and components where a single bug can change your entire threat model.

Depth over breadth

We don’t do checkbox audits. We take a small number of targets and go deep until we’re satisfied with coverage and understanding.

Honest signal

Clear reporting, no inflated severity, and no noise. If we say it matters, it’s because we’d care about it in an actual exploit chain.

Engage F13 Labs

Let’s talk about your target surface

We work with a small number of teams at a time. If you have a specific component, product, or protocol in mind, share enough detail for us to understand the scope.

Preferred topics:
· Critical parsers, protocol stacks, IPC/RPC
· Complex legacy components
· High‑impact security boundaries
Not a fit:
· Generic web pentests
· Compliance‑only work

Contact details

Replace the placeholders below with your real contact channels.

PGP (optional):
pgp@f13-labs.net
Location:
Remote · Research‑driven