About us

Zero Day Engineering

The Concept

Zero day engineering as a concept represents creating of previously unknown technology with a high power potential. In the narrow sense of computer security, it stands for research and development of cutting edge offensive technologies that bypass all the defenses, by design. The latter is commonly achieved by contsructing an arbitrary code logic on top of a suitable security bug in a target system, and then chaining multiple such constructs to the final objective – an exploit.

Modern software vulnerability research is a blossoming industry, represented with public security bounty programs and in-house offensive research teams funded by the world's leading software vendors, international competitions with cash rewards, and major governmental grants. We like to indulge in the complex, dynamic, and highly adversarial nature of challenges in this space, while sharing the knowledge and insights collected in the process in an ethically neutral way.

An icon for being the first ever female participant in Pwn2Own, the world's premiere hacking competition, Alisa Esage Shevchenko was famous long before that historical win for alleged links to state-level cybersecurity projects, as suggested by governmental authorities. Alisa is the mastermind behind all the Zero Day Engineering products. Boasting countless years of professional experience and insane hacking skills, Alisa taught herself CPU assembly programming and reverse engineering at the age of 15, and led a wide variety of cybersecurity and hacking projects, before settling to specialize exclusively on cutting edge research in low-level computer security. Since then, she has been known for discovering critical security vulnerabilities in software used by millions, publicly acknowledged by international corporations and governmental CERTs, and expertly referred to in professional media publications. Alisa Esage established the Zero Day Engineering project in 2021 with a vision to leverage her deep expertise in both engineering and entrepreneurship to build a structured single-source system of training and certification spanning from entry level to some of the deepest and hardest topics in computer security, which takes to be a hacker at the top of the game to know. Alisa Esage was exclusively featured in Forbes, The Guardian, and The New York Times, while being cherished and looked up to in the smaller community of cybersecurity industry.

Alisa Esage on Twitter

Core principle of Zero Day Engineering: always see the root of things. As all knowledge in the world is structured hierarchically, it is possible to embrace an enourmous scope of it by focusing on the foundation basis, and then making it practical for specialized applications.

Such a deep-and-wide systematical perspective enables us to know a lot, solve complex problems in unexpectedly elegant ways, introduce novel solutions that are simple yet effective, and easily transcend illusory boundaries of topics, specializations, and entire industries.

Regardless of the fashionable cyber buzzword of the moment, there exist only two possible root causes of any security compromise: technical systems vulnerabilities, and human vulnerabilities. As global trends in technology move to eliminate human factors while accelerating technical ones, deep expertize on technical systems vulnerabilities is becoming a critical point in all technological developments.

The answer to this is knowledge. Instead of leveraging the expertise to build yet another defensive system that we know first hand will be attacked and bypassed, we develop raw intelligence products covering the primordial knowledge gap that enables the existence of vulnerabilities and exploits in the first place.

All our products are specially crafted and exceptional, based on genuine insights from beyond the edges of the known, and aim to actually solve problems rather than introducing new ones. And we expect our customers, students, and brand ambassadors to share our values.

Let's talk!
1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 •