What We Do

We help secure complex systems by thinking like attackers — uncovering vulnerabilities, analyzing malware, and reverse engineering software at the deepest levels.


Security Auditing Icon

Security Auditing

We audit systems and applications with an attacker mindset to uncover critical, real-world security flaws. We focus on identifying high-impact, high-value issues that matter in practice — not just in theory. When vulnerabilities are discovered, we provide clear proof-of-concepts along with actionable, pragmatic hardening recommendations.


Vulnerability Research Icon

Vulnerability Research

We identify high-impact security flaws in complicated, high profile systems. Our team has a proven track record in identifying and exploiting code execution and privilege escalation bugs around Android and Linux kernel.


Malware Research Icon

Malware Research

We dissect malware to understand behavior, uncover infrastructure, and support detection through tooling, IOCs, and profiling. Our team is experienced with bypassing anti research techniques, developing tooling and research automations, and analyzing malware built for Linux, Windows and Android.


Reverse Engineering Icon

Reverse Engineering

We reverse engineer binaries, firmware, and obfuscated code to understand how things actually work. We are experienced with x86 and Arm architectures, reversing Android apps, and closed source software related to Android, Linux and Windows


System Internals Icon

System Internals

We research the internals of Android, Linux, and Windows — from kernel to userland. Our experience includes Android root detection (and anti root detection), through the Android framework, to kernel drivers, and more.