Reverse Engineering

No source code? No problem! Here you'll find fluent x86, x86_64, ARM, PPC, MIPS, SH-4, Z80, 8051, 6502, SPARC and ARC, over a number of platforms and expertise extracting and reversing firmware from embedded systems.

Custom Security Tools Development

Data mining, network traffic analysis, remote control, position independent code generation tool. You request it, you'll get it.

Open and Close Application Security Review

About to release a new product and don't wanna make it to embarrassing or unpleasant headlines? or about to add a new products/appliance/software to your infrastructure and you want to make sure you are not opening new doors for attackers?

Incident Response

One of the toughest things is to realised you've been compromised. Getting to know how it happened, what information was exfiltrated, getting to know who was behind the attack, are mayor concerns to prevent it from happening in the future.

Cyber Intelligence Services

Cyber Intelligence Services and logistics for challenging and demanding customers

Information Security Consulting and Cutting Edge Research



Cyber attacks are carried out against corporations every day by a wide range of actors for a variety of purposes. Insiders are stealing intellectual property to sell on the black market; well funded criminal organizations are stealing customer data to hijack their cash and credit

Offence or Defence?

Inoffensive Technologies plays both, you'll love the results.
Remember that most critical threats don't have a CVE.
You will be interested in at least one of the following Services