Our Story

Pushing the boundaries of OffensiveCybersecurity

We're on a mission to revolutionize the state-of-the-art on testing digital assets through the power of AI and Offensive Security

Our Mission & Vision

The guiding principles that drive our company forward

Mission

"

To advance the state of offensive security by enabling more effective evaluation, testing, and deployment of models and Automating the Pentesting Workflow for effectivness.
"

Our Story

From a small team of Security Researchers to an Industry-leading Offensive Security Organization

Novaize was founded in 2022 by a visionary Security Researcher and a pioneering Security/AI Researcher whose paths converged by fate.

They recognized a critical gap in reactive security measures and envisioned a proactive, AI-driven offensive security paradigm.

After three years of intensive research and development, we launched our flagship product, the LightxAI Platform to address this gap and protect millions of Organizations worldwide.

22-04
2022-04

Company Founded

Novaize was founded by APT0xSnowdox and Joseph Wimalasuriya with a vision to revolutionize Offensive Security through artificial intelligence.

22-05
2022-05

Initial Research and Development

Began to research on TTPs of threat actors and built custom tools for Adversary Emulation to mimic those attack vectors.

23
2023

Diving into the world of Malware Development

Using prior research, we successfully bypassed top EDRs with custom malware leveraging techniques like Call Stack Spoofing and Ghost Process Hollowing.

24
2024

Integrating Machine Learning and AI

Training datasets on pre-trained models to automate pentesting workflows using self-developed AI Agents.

25-01
2025-01

Started Building an AI Red Teaming Platform

Read Research Papers on NVIDIA and OpenAI Red Teaming and started developing the MVP Version of a Model Evaluator Which was a huge success.

25-06
2025-06

Launch On The Beta Version

Not Only an AI Red Teaming platform, but a full fledged Offensive Security Solution includes Vulnerability Researching and Agentic Pentesting.

Meet Our Crew Crew

Our diverse team of experts brings together years of experience in cybersecurity, artificial intelligence, and enterprise software

APT0xSnowdox

APT0xSnowdox

Founder

Security Researcher with hands on experience in Offensive Security with a huge passion for AI Security.

Joseph Wimalasuriya

Joseph Wimalasuriya

Co-Founder & CTO

Since 2018 developing AI Security Solutions and conducting Security Assessments globally. Previously led Red Offensive operations at a Indian Cyber Security Firm.

Kavindu Sahan

Kavindu Sahan

Head Of Security Research

Energetic Cyber Security Researcher with hands on experience in Penetration Testing and Security Research Principles.

Themalka Anjala

Themalka Anjala

Head Of UI/UX

Years of experience in UI/UX Design and Development. Previously worked as freelance UI/UX Engineer for Foreign Clients.

Kenura Gunarathne

Kenura Gunarathne

Lead Developer - Full Stack

Energetic Cyber Security Researcher with hands on experience in Penetration Testing and Security Research Principles.

Our Approach

What makes Novaize different from traditional cybersecurity solutions

AI-First Architecture

Our platform is built from the ground up with AI at its core, not as an afterthought.

Predictive Intelligence

We don't just react to threats - we predict and prevent them before they materialize.

Continuous Learning

Our systems evolve in real-time, learning from TTPs of threat actors using Reinforcement Learning to improve the next attack vector.

Human Expertise

We combine AI capabilities with human security experts for comprehensive protection.

Why We're Different

See how Novaize compares to traditional cybersecurity solutions

FeatureTraditional SolutionsNovaize
Adversarial Attack GeneratorMinimal or NoneAutomatically crafts adversarial inputs to test AI/LLM model robustness under manipulation.
Prompt Injection Fuzzing EngineNoneRandomly mutates and chains prompts to uncover vulnerabilities, jailbreaks, and misalignment in LLMs.
Zero-Day Simulation LabNever ExistedEmulates zero-day exploit scenarios using AI agents trained on threat intelligence data and vulnerability patterns.
Model Fingerprinting & Extraction Tools(Sandbox)MinimalIdentifies AI model types and attempts black-box extraction to assess intellectual property risk.
Data Poisoning SimulationNoneInjects malicious data into training pipelines to test model susceptibility to poisoning and data contamination.
Auto-Reconnaissance Intelligence LayerWith LimitationsAI agents gather public OSINT data, identify shadow assets, and map relationships between internal and external systems.
Risk Scoring Engine (AI-Specific)MinimalQuantifies and ranks vulnerabilities based on AI attack vectors, exposure, and potential business impact.
Agentic Penetration TestingManual TestingAI agents autonomously perform reconnaissance, exploit generation, and validation across networks and systems.
AI Model Evaluation
Predictive Analysis
Autonomous Response

Our unique approach has helped organizations reduce security threats by up to 85% by staying ahead of the threat actors. 90%.

Our Values

The principles that guide everything we do

Innovation

We constantly push the boundaries of what's possible in cybersecurity, never settling for the status quo.

Integrity

We operate with complete transparency and honesty, earning the trust of our clients through our actions.

Impact

We measure our success by the real-world protection we provide to organizations and their users.

Collaboration

We believe in the power of teamwork, both within our company and in partnership with our clients.

Adaptability

We embrace change and continuously evolve our solutions to address emerging threats.

Responsibility

We take our role in protecting critical infrastructure and sensitive data with the utmost seriousness.

Our Partners

Trusted by industry leaders worldwide

Limited Time Offer

Ready To Test Your Defenses?

Get started today with a free security assessment and see how our platformcan transform your cybersecurity posture.