Research

OSINT Operation

If it’s on the internet we will find it.
An OpenSource INTelligence operation will be conducted against your target whether it is a physical person, website, or company.
A fully redacted report will be filled out and delivered to you.

Computer Forensics

Blue team activities such as log analysis, backdoor detection, and intrusion detection cannot always be delegated to an automated system. We will analyze your machine looking for a possible attack or try to recover your data in case of corruption/intrusion.

Malware analysis

Once you discover they’re in you need to be sure that now they’re out. We are going to analyze your malware for getting a better understanding of what they did and how they did it for being able to completely remove them from your device and put in place all the precautions required.