Research

Reasearch occupies an important place in our day to day activity. We look for new threats and use our findings to develop new security tools or enhance existing ones. We share critical results with our clients based on each different need.

  • Vulnerability Research

    We look for unknown vulnerabilities hidden in web applications, stand-alone software, operating systems, hardware devices and enterprise applications on commission or independently. In the latter case we follow a responsible disclosure policy.

  • Reverse Engineering

    We study stuff to understand its functionalities and properties. Reverse engineering comes handy when finding vulnerabilities, analyzing a malware, assessing software protection scheme or extending legacy software .

  • Development

    The right piece of software helps in many ways. It automates and manages daily security services, or demonstrates a vulnerability and exploits it (POCs). It helps detecting malware, or custom malware can be used by red teams in above the average aggressive penetration tests. This is what we usually develop.

Contact us

Thanks!

Your message has been sent.