The vulnerability discovery service aims to provide you with the (offensive) intelligence of target software systems. It is an in-depth security assessment with the end-goal of discovering and demonstrating critical 0-day and N-day security weaknesses. To achieve this, our experienced researchers will utilize our custom set of methodologies and program analysis strategies.
This service can be useful to complement the software-development-life-cycle (SDLC) prior to products shipping for vendors, or as independent security evaluation prior to products purchase for enterprises.
The pricing of vulnerability discovery service varies on the complexity and thoroughness of assessment. We will work with you closely to manage the costs. Please contact us for additional information.
Our custom set of methodologies and program analysis strategies typically involves:
The deliverables for this service are assessment reports with the following information:
The malware analysis service aims to provide you with the (defensive) intelligence of hostile code in your systems and infrastructure. It is an in-depth assessment of suspicious applications to determine potential malicious behaviour. Combining both static and dynamic reverse-engineering techniques, our experienced researchers will gain insights to such activities and details:
The deliverables for this service are assessment reports describing malicious behaviour and indicators-of-compromise. This service can be useful to complement existing incident response procedures or to offer second-opinion assessments.
The pricing of malware analysis service varies on the service level and duration of engagement. We will work with you closely to manage the costs. Please contact us for additional information.
Contact UsThe security tools development service aims to provide you with custom capabilities to improve your existing assessment workflow and processes. As both developers and users, our experienced researchers understand that tools have to be functional, practical, efficient, stable and easy-to-use all at the same time. In addition to development, we value-add by sharing our experiences with different technologies to conceptualise your custom tools. Examples of security tools that we develop includes:
The pricing of security tools development varies on the complexity and scale of tool-requirements. We will work with you closely to manage the costs. Please contact us for additional information.
Contact UsWe offer vulnerability discovery and malware analysis training classes and workshops for all technical levels to share our knowledge and expertise. Training classes are structured learning with planned syllabus consisting of theoretical and practical components. As these are intended for students who may be new to the topics, the practical component will not exceed 40% of the schedule. The class syllabus may be custom-tailored to address specific requirements of your organization.
Workshops are 100% custom-tailored classes with unstructured learning and maximal practical component. Before commencement of the workshop, we will work closely with you to set the objective (eg: "assess the security of application X") and learning format (eg: duration of each task). During the workshop, we will lead the students in brainstorming, identifying, shadowing and executing individual tasks. Any discoveries made during the class will belong to you. As these are more hands-on in nature, workshops are intended for students who are already familiar with the theoretical knowledge.
The pricing of trainings and workshops varies on the syllabus and duration. Please contact us for additional information.
Contact Us