Monthly contracts available to hire reverse engineers for vulnerability research or malware analysis to aide threat hunters.
We develop custom training packages tailored specifically to our clients needs. These can include internal capture the flag events or detailed walkthrough’s with IDA Pro IDB files to follow along with during analysis.
Vulnerability research reporting and “Advanced persistent threat” malware sample reports
Physical onsite assessments and remote external assessments of the internal network.
APT’s use specialized tools and techniques to attack targets. We strive to develop some of the best “in-house” tooling rivaling the capabilities seen by advanced threat actors.
We try to give back to the industry as much as possible with paid/free trainings and releasing open-source tooling.
Who We Are
Small team of seasoned and passionate researchers learning the art of the elusive threat.
Our Vision
Hack, Hunt, Secure.. Repeat
Our Mission
Secure customers by providing the technical knowledge and capability of modern elusive threats.