dissecto provides easy access to security diagnostics, analytics, and solutions while guiding you through security training and workshops.

Founded in 2022, by the maintainers and primary contributors to “Automotive Scapy,” a widely embraced packet manipulation tool in the automotive industry, dissecto specializes in simplifying security diagnostics, analytics, and solutions for embedded systems. Our flagship product, dissecto HydraVision, is an automated security test environment for electrical control units (ECUs), that detects and reports vulnerabilities. Alongside, we provide security training, pentesting and advanced hardware solutions like the dissecto HydraHat gateway.


Consulting & Development

dissecto assists you in testing the specific functions/security measures of your hardware. We specialize in the following:

  • Security tests of entire vehicles
  • Penetration tests of ECUs and embedded systems
  • Hardware-Security Analysis
  • Processor-Security Analysis
  • Proof of Concept Attacks and Showcases

HydraVision PaaS

HydraVision is a platform as a service, that integrates automated security testing into ECU lifecycles, ensuring compliance with the latest directives and standards like UNECE R155 and ISO/SAE 21434. New threats reported by developers, dissecto research or third parties such as Auto-ISAC are proactively monitored and tested, without the need to create new attack vectors against your system

Hardware & Software

HydraHat is a dual CAN FD to Ethernet Gateway providing reliable and efficient data communication

HydraProbe is a Test Interface that plays an important role within our HydraVision environment

HydraScope is an ISOTP and UDS protocol scanner that enables users to communicate with Electronic Control Units (ECUs)

Workshops & Training

For over 8 years, we’ve constantly been developing our systems and practices, so we can help aspiring automotive security specialists or any person who wants to improve in this challenging field. Learn more about cybersecurity, from the basics of protocols and reverse engineering to hacking real vehicles and control units. Accompanied by practical exercises and anecdotes


“… We experience you as a valuable and professional partner. Taking this opportunity, we would like to emphasize that we highly appreciate your profound know-how, expertise and the effort you have put to help further secure our vehicles …”

Adi Ofek & Daniel Eitler, Mercedes Benz Group AG

Benefits of our All-in-One Offerings

By combining SaaS technology, customer support, and our expertise, we developed a test management system allowing us to offer cost-effective embedded system security (ESST) testing services. The (SaaS) model allows us to provide a low-cost, high-quality product developed by our ESST experts team. This automated testing tool is now being used by companies worldwide.

The basis of our USP is formed by several years of research and development, which enables us to implement our product and offer our services in the first place. Best practices and uniform procedures combined with experience gained in the service area fuel further product development and standardize future service projects.

As security becomes increasingly important, software error and security tests must be performed more comprehensively. Our test management system performs automated security tests on embedded systems. Every test can be carried out at any time, and it is traceable and reliable. Adding to that, our test management system is flexible and scalable.

Latest from our Blog

  • Cybersecurity 101

    Cybersecurity 101

    The word “cybersecurity” is a fusion of two words: “cyber,” derived from the Greek word “kybernetes,” meaning “steersman” or “governor,” and “security,” which we all…

    Read more →

  • Meet us @ embedded world 24

    Meet us @ embedded world 24

    Would you like to experience the latest innovations from dissecto? Then we invite you to our booth 5-280 at #embeddedworld 2024! The embedded world Exhibition&Conference…

    Read more →

  • Types of Hackers: the Good, the Bad & the Ugly

    Types of Hackers: the Good, the Bad & the Ugly

    In the world of the internet, the term “hacker” can mean different things to different people. In this blog post, we’ll take a closer look…

    Read more →

  • CAN Card: Business Card turned Interface

    CAN Card: Business Card turned Interface

    The worlds first business card that is also a CAN interface! The dissecto CAN Card based on the candleLight project and is open source and open hardware. The hardware is…

    Read more →

  • Escar23: Key Takeaways

    Escar23: Key Takeaways

    Last week, we were an exhibitor at the 21st escar conference in Hamburg. First held in Germany in 2003, escar has since established itself internationally – in…

    Read more →


We are dedicated to improving automotive system security, so we engage and challenge ourselves to learn more about it. Dissecto has been part of seminars and training that aim to provide more people with a more secure environment when using their automobiles. You can check out more of our engagement with this field through the following videos:

TROOPERS23: Fault Injection Attacks on Secure Automotive Bootloaders

Relay Attack applied to NFC Virtual Car Keys

From Blackbox to Automotive Ransomware

Bringing light into the Black Box

TROOPERS19: Automotive Penetration Testing with Scapy

TROOPERS19: SIM Simulator

TROOPERS22: Automotive Network Scans with Scapy

TROOPERS19: IoT backdoors in cars

Fault Injection Attacks on Secure Automotive Bootloaders