AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Building Tools: What, When, and How

Date:
Wednesday, February 18
Time:
2 p.m. ET / 7 p.m. GMT
Cybersecurity workshop graphic “Building Tools: What, When, and How” highlighting practical guidance on when and how to build security tools.

The security ecosystem is packed with tools—frameworks, scanners, helpers, and one-off scripts for almost every imaginable task. And yet, many of the most effective solutions still start the same way:

“I guess I’ll just build it myself.”

In this workshop, Senior Security Analyst Tom Hudson explores the practical realities of building your own security tooling focusing on decision-making first, code second.

This isn’t about building tools for the sake of it. It’s about knowing when it’s worth the effort, when existing tools are the better choice, and how to build something useful without overengineering or burning time.

Prefer Discord? You can register and join the conversation:  
https://discord.com/invite/ANytASyDFr?event=1468334799235186833

What You’ll Learn (and See in Action):

  • How to decide when building a custom tool makes sense—and when it doesn’t
  • How experienced practitioners think about scope, tradeoffs, and simplicity
  • Practical approaches to designing and building command-line tools
  • Real-world examples (mostly in Go) that illustrate common tooling patterns
  • How these ideas translate across languages, even if Go isn’t your daily driver

Examples will focus on small, focused tools designed to solve real problems—prioritizing speed, clarity, and usability over polish or perfection.

This workshop is built for:

  • Security practitioners, pentesters, and Red Teamers
  • Engineers who regularly write scripts or internal tools
  • Anyone who’s ever debated whether to “just script it”
  • Learners who want to build better instincts around tooling decisions

You’ll leave with clearer judgment about when to build, and a stronger mental framework for how to approach it when you do.


Tom Hudson BF Headshot

About the speaker, Tom Hudson

Senior Security Analyst

Tom Hudson is a Senior Security Engineer at Bishop Fox, where he is part of the capability development team for Cosmos. He specializes in developing innovative tools that improve the quality of intelligence generated and processed through continuous penetration testing. Tom is the well-known author of numerous command-line tools, which can usually be leveraged together for security research, penetration testing, and bug bounty hunting. His contributions include open source projects such as gron, meg, and unfurl.

Tom is an active member of the information and cybersecurity community and has been a speaker at multiple events including the RSA Conference, BSides Leeds, Agile Yorkshire, the Sky Betting & Gaming Tech Talks, and Hey! Presents. He has also made guest appearances in popular podcasts and YouTube channels, such as HackerOne, Security Weekly, Undetected, STÖK, Web Development Tutorials, and his work has been featured in the Code Maven and Intigriti blogs. He was awarded a Most Valuable Hacker (MVH) belt at the h1-4420 live event in 2019.

Tom enjoys giving back to the community through mentoring and teaching. He has hosted multiple workshops, including a series of talks on cybercrime for UK police and investigators.

More by Tom

Ready to get started? We can help.

Contact Us

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.