Building digital resilience through penetration testing.

At Eradix, we are committed to contributing to a safer digital society. We help organizations strengthen their cyber resilience. By helping organizations, we contribute to the security of their clients, partners, and end-users. And that is what matters.  By combining the sharpest minds in cybersecurity with cutting-edge offensive techniques, we provide organizations with the confidence to build their future – securely.

The challenge

AI models like Claude Mythos find vulnerabilities at scale but overwhelm teams with false positives and miss context: business logic, custom setups, and how attackers chain exploits into killchains. At Eradix, we merge AI’s efficiency with human insight, acting like adversaries to validate threats and cut through noise. True security isn’t about finding flaws; it’s about knowing which ones matter. That’s why manual mastery is irreplaceable.

Our story

We are not just another cybersecurity company. Eradix is a team of ethical hackers driven by one mission: helping organizations stay secure in an AI-driven threat landscape. What began as a passion became our profession, shaped by mastery, precision, and a relentless pursuit of quality.

Our story began in late 2023. We quickly recognized a common standard: deep expertise, uncompromising quality, and a shared vision on (offensive and defensive) cybersecurity. Wietse and Hidde have years of expertise in penetration testing and red teaming at Pinewood, CGI, I-Real and the Ministry of Justice. They've found vulnerabilities in countless software products and digital platforms (see for example Kaseya or Enphase). Jasper brings strategic experience from Deloitte, Shell, GLS, the Ministry of Justice to the table.  That combination sets us apart. We combine advanced offensive testing with strategic insight to uncover what others miss, expose vulnerabilities, and clarify priorities. With Eradix, you gain more than a report. You gain an experienced partner focused on resilience, clarity, and protecting what matters most.

our approach

A methodical, human-centered approach

Understand the ecosystem
We begin by immersing ourselves in your systems. Ideally not just the code, but the context. Architecture, workflows, and business logic are mapped to uncover what automated tools overlook: the nuances that define real risks.
Emulate adversaries
We don’t just scan; we think like attackers. By simulating realistic breach scenarios, we expose not only vulnerabilities but especially how they could be exploited. We perform structured tests, use some intuition, and a fair bit of magic.
Assess in context
Vulnerabilities are meaningless without impact and relevance. We filter the noise, prioritize risks based on exploitability, business criticality, and tactics attackers would actually use.
Enable actions
Reports don’t secure systems. The clarity to take action does. We distill complexity into actionable priorities, ensuring you know exactly where to focus and why it matters.

Not all vulnerabilities are created equal

Effective offensive security requires human supervision and creativity. At Eradix, we harness the power of AI and think like adversaries. We validate vulnerabilities and  determine their exploitability and link them together to create actual exploit paths. AI is just one of the tools we use. True security demands human mastery. Not all vulnerabilities are created equal. The most dangerous flaws are the ones that are exploitable whilst no defense layers are present. That’s why human mastery remains essential.

Our services

From testing to insight

Our work combines advanced offensive testing with structured analysis. We simulate realistic attack scenarios to uncover vulnerabilities, and translate findings into clear, actionable priorities for both technical teams and decision-makers. The result is not just a report, but a clear understanding of where you stand and what to do next.

Our services

Meet our team

Profile picture of  Jasper Schenkhuizen business development and security consultant
Jasper Schenkuizen
business development and security consultant
Profile picture of  Hidde Smit senior ethical hacker / researcher
Hidde Smit
senior ethical hacker / researcher
Profile picture of  Wietse Boonstra senior ethical hacker / researcher
Wietse Boonstra
senior ethical hacker / researcher
get clarity

See beyond the surface of your applications.

Contact us