ih-loo-siv : “difficult to find, skillfully evasive”

Trust No One

Services

OUR SERVICES FOR CLIENTS

Tailored Reverse Engineering

Monthly contracts available to hire reverse engineers for vulnerability research or malware analysis to aide threat hunters.

Malware Training

We develop custom training packages tailored specifically to our clients needs. These can include internal capture the flag events or detailed walkthrough’s with IDA Pro IDB files to follow along with during analysis.

Intelligence Feeds

Vulnerability research reporting and “Advanced persistent threat” malware sample reports

Threat Emulation

Physical onsite assessments and remote external assessments of the internal network.

Tool Development

APT’s use specialized tools and techniques to attack targets. We strive to develop some of the best “in-house” tooling rivaling the capabilities seen by advanced threat actors.

Community

We try to give back to the industry as much as possible with paid/free trainings and releasing open-source tooling.

About

Who We Are

Small team of seasoned and passionate researchers learning the art of the elusive threat.

Our Vision

Hack, Hunt, Secure.. Repeat

Our Mission

Secure customers by providing the technical knowledge and capability of modern elusive threats.