Advanced Research
Reverse Engineering
-[Fluent x86, x86_64, ARM, PPC, MIPS, SH-4, Z80, 8051, 6502, SPARC and ARC]-
-[Solid experience in Windows, VxWorks, Cisco IOS, QNX, Solaris, Linux, OSX, iOS, Android, Symbian, BlackBerry and other embedded RTOS/OS-less firmware]-
-[In our book reverse engineering means fully reverse the design and implementation logic as well as manual decompilation of binaries back to C/C++]-
Embedded Systems Firmware Analysis and Reverse Engineering
-[Firmware extraction, reverse engineering and custom features extension]-
Cyber Intelligence Services
Custom Security Tools Development
-[Network traffic analysis, data mining, remote control, position independent code generation, and more.]-
Incident Response
-[In-depth analysis of (embedded) systems and artefacts, in order help you shed some light on what actually happened and take countermeasures.]-
Forensics
Malware Analysis
Threat Analysis and Mitigation
Penetration Testing
Open and Close Source Application Security Review
-[C, C++, Objective-C, C#, python, (x86|x86_64|ARM|PPC)ASM, php, ruby, java, among others.]-
Threat Modeling
Design Security Review
Training
-[Each training is always customised in order to meet the customer needs.]-
The following is a list of training topics, but it is always possible to add on-demand technical training sessions.
-[ Reverse Engineering
-[ Malware Analysis
-[ Exploit Development
-[ Vulnerability Development
-[ Fuzzing
-[ Secure Development
-[ Security Awareness
-[ Threat Modeling
-[ Penetration Testing