What We Do
We help secure complex systems by thinking like attackers — uncovering vulnerabilities, analyzing malware, and reverse engineering software at the deepest levels.
Security Auditing
We audit systems and applications with an attacker mindset to uncover critical, real-world security flaws. We focus on identifying high-impact, high-value issues that matter in practice — not just in theory. When vulnerabilities are discovered, we provide clear proof-of-concepts along with actionable, pragmatic hardening recommendations.
Vulnerability Research
We identify high-impact security flaws in complicated, high profile systems. Our team has a proven track record in identifying and exploiting code execution and privilege escalation bugs around Android and Linux kernel.
Malware Research
We dissect malware to understand behavior, uncover infrastructure, and support detection through tooling, IOCs, and profiling. Our team is experienced with bypassing anti research techniques, developing tooling and research automations, and analyzing malware built for Linux, Windows and Android.
Reverse Engineering
We reverse engineer binaries, firmware, and obfuscated code to understand how things actually work. We are experienced with x86 and Arm architectures, reversing Android apps, and closed source software related to Android, Linux and Windows
System Internals
We research the internals of Android, Linux, and Windows — from kernel to userland. Our experience includes Android root detection (and anti root detection), through the Android framework, to kernel drivers, and more.