AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Building Tools: What, When, and How

Surrounded by security tools but still tempted to “just build it”? This hands-on workshop breaks down when custom tooling is worth it, when it’s not, and how to build fast, focused tools without overengineering.

The security ecosystem is packed with tools—frameworks, scanners, helpers, and one-off scripts for almost every imaginable task. And yet, many of the most effective solutions still start the same way:

“I guess I’ll just build it myself.”

In this workshop, Senior Security Analyst Tom Hudson explores the practical realities of building your own security tooling focusing on decision-making first, code second.

This isn’t about building tools for the sake of it. It’s about knowing when it’s worth the effort, when existing tools are the better choice, and how to build something useful without overengineering or burning time.

Session Summary:

Tom Hudson walks through a practical framework for deciding why and when to build security tools, emphasizing that tools are capability amplifiers and that “reinventing the wheel” is often appropriate when you need a specialized fit, tighter control, or faster iteration. He advocates for a pragmatic, iterative approach: start with a real problem, build the simplest viable solution, and refine as you learn—favoring “Iron Man” tools that augment human operators over “Ultron” tools that try to replace them. Using the Unix philosophy (small composable programs connected via stdin/stdout) and pragmatic interfaces like plain text or JSON Lines, he live-codes two small Go utilities that chain together to find reflected parameters and expand URL parameter coverage across hosts, demonstrating how quick, modular tools can unlock real workflow leverage.

Key Takeaways:

  1. Start with a problem, not a tool idea: the best tools are born from a concrete pain point (speed, control, visibility, repeatability).
  2. “Don’t reinvent the wheel” is overapplied: specialized “wheels” are common in real industries—building a custom tool is often the right move.
  3. Build the simplest thing that works (and iterate later): avoid “world’s best tool” traps; YAGNI applies hard in tooling.
  4. Prefer augmentation over replacement: design tools that keep the human in the driver’s seat for accountability, observability, and creativity.
  5. Compose small tools via stdin/stdout: the Unix style enables chaining tools written by different people (or past-you) into workflows greater than the sum of parts.
  6. Use pragmatic interfaces: plain text is great; when structure matters, JSON Lines is a solid middle ground.
  7. Language choice is secondary to fluency: use what you know best; Go can be great for CLI tooling due to distribution and standard library, but bash/Python/etc. absolutely “count.”

Tom Hudson BF Headshot

About the speaker, Tom Hudson

Senior Security Analyst

Tom Hudson is a Senior Security Engineer at Bishop Fox, where he is part of the capability development team for Cosmos. He specializes in developing innovative tools that improve the quality of intelligence generated and processed through continuous penetration testing. Tom is the well-known author of numerous command-line tools, which can usually be leveraged together for security research, penetration testing, and bug bounty hunting. His contributions include open source projects such as gron, meg, and unfurl.

Tom is an active member of the information and cybersecurity community and has been a speaker at multiple events including the RSA Conference, BSides Leeds, Agile Yorkshire, the Sky Betting & Gaming Tech Talks, and Hey! Presents. He has also made guest appearances in popular podcasts and YouTube channels, such as HackerOne, Security Weekly, Undetected, STÖK, Web Development Tutorials, and his work has been featured in the Code Maven and Intigriti blogs. He was awarded a Most Valuable Hacker (MVH) belt at the h1-4420 live event in 2019.

Tom enjoys giving back to the community through mentoring and teaching. He has hosted multiple workshops, including a series of talks on cybercrime for UK police and investigators.

More by Tom

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.