Services

Advanced Research

Reverse Engineering

-[Fluent x86, x86_64, ARM, PPC, MIPS, SH-4, Z80, 8051, 6502, SPARC and ARC]-

-[Solid experience in Windows, VxWorks, Cisco IOS, QNX, Solaris, Linux, OSX, iOS, Android, Symbian, BlackBerry and other embedded RTOS/OS-less firmware]-

-[In our book reverse engineering means fully reverse the design and implementation logic as well as manual decompilation of binaries back to C/C++]-

 

Embedded Systems Firmware Analysis and Reverse Engineering

-[Firmware extraction, reverse engineering and custom features extension]-

 

Cyber Intelligence Services

Custom Security Tools Development

-[Network traffic analysis, data mining, remote control, position independent code generation, and more.]-

 

Incident Response

-[In-depth analysis of (embedded) systems and artefacts, in order help you shed some light on what actually happened and take countermeasures.]-

Forensics

Malware Analysis

Threat Analysis and Mitigation

Penetration Testing

 

Open and Close Source Application Security Review

-[C, C++, Objective-CC#, python, (x86|x86_64|ARM|PPC)ASM, php, ruby, java, among others.]-

Threat Modeling

Design Security Review

 

Training

-[Each training is always customised in order to meet the customer needs.]-

The following is a list of training topics, but it is always possible to add on-demand technical  training sessions.

-[ Reverse Engineering

-[ Malware Analysis

-[ Exploit Development

-[ Vulnerability Development

-[ Fuzzing

-[ Secure Development

-[ Security Awareness

-[ Threat Modeling

-[ Penetration Testing

Comments are closed