researches

vulnerability researches

Analyse a product, protocol, algorithm, or related products to identify, understand or exploit vulnerabilities.

offensive assessments

Our offensive website assessment service simulates real-world cyberattacks to identify exploitable weaknesses in your products.

application security

We can help you find vulnerabilities in your mobile and web applications through real-world attack simulations, comprehensive assessments, and cloud security evaluation.

We focused in the fields of:

mobile apps

We specialised on- Mobile appsResearch on the security of Android and iOS client applications.

blockchain systems

Smart contracts, consensus mechanisms, and cryptographic protocols.

generative AI

Research and Securing AI Applications and Large Language Models.

exploit & security dev

Our dedicated team contributes to advancing cybersecurity by specialising in two key areas: proactive exploit development and the design of innovative security automation tools.

mentorship

We offer intensive security training on demand, covering vulnerability research, mobile exploitation, web applications, and cloud security.