Consultation Services

because the blue team has to win

OS Hardening

Linux OS attack surface reduction

Security Architecture

Complex systems, interactions and interfaces

Machine Learning

Security of ML Systems

Software Development

Secure Developement Practices & Tooling

Security Research

Reverse Engineering and Tooling for Exploitation

Cryptography

Mainly classic, some elliptic curves