Offensive security and long term Red Team assessments are provided by Toucan's team of security engineers. Over the past 9 years, we have performed assessments on a global scale, covering most of the CAC 40 as well as global companies.
We love nothing more than discovering new problems. From connecting IoT devices to cars or health systems, receive personalized advising on design, implementation, configuration, and monitoring in production.
Innovation is at the core of Toucan System. Toucan finances research and development activities thanks to consulting. This allows us to learn contiuously about the emerging security best practices as well as problems faced by the industry. Toucan System is labeled OSEO by the French Government as a top innovative company.
Nicolas is the Co-Founder and CTO at Toucan System. With over a decade of experience in security assessments, he's the soul and mind behind the Red Team missions. Nicolas is the principal co-inventor of Toucan System's patents and holds a Masters degree in Engineering from the Ecole des Mines.
" From sensitive Red Team assessments to security consulting missions : confidentiality and professionalism are at the top of our values and concerns. "
Original Research
Exclusive presentations
Hardware backdooring is practical
Read the DEF CON whitepaper.
WCC : The witchcraft Compiler Collection
Find the source code of WCC on github.
Hardware backdooring is practical
Video recording of our DEFCON presentation.
PMCMA : Post Memory Corruption Memory Analyser
Find the source code of PMCMA on github.
WCC : The Witchcraft Compiler Collection
Video recording of our DEFCON presentation.
PMCMA : Post Memory Corruption Memory Analysis
Whitepaper of out Blackhat USA presentation.
WCC : the Witchcraft Compiler Collection
DEF CON whitepaper.
PMCMA : Post Memory Corruption Memory Analysis
Video recording of our Blackhat presentation.
Toucan System
Press coverage
Researcher Jonathan Brossard has innovated a uniquely nasty coding trick: A strain of malware that's nearly impossible to disinfect.
Andy Greenberg
Journalist - Forbes
A hacker demonstrates that code can be hidden inside a new computer to put it forever under remote control.
Tom Simonite
Writer - MIT Technology Review
Mr Brossard is one of the world’s best-known ‘‘ethical hackers’’, and uses his computer skills to help companies strengthen their cyber security.