About Us
We're a specialised supplier providing cyber security research and engineering services. Our team has a long and successful track record of delivering complex technical research and high quality software products across a range of platforms and technologies.
We understand that even the cleverest technical solution is of little value if it doesn't integrate and cooperate with a customer's wider ecosystem. That's why we like to work closely with customers so that we fully understand their requirements and constraints, enabling us to build systems that can deliver impact and value.
We're committed to helping build an inclusive, diverse and highly skilled cyber security workforce. We'll be recruiting, training and empowering our own brilliant consultants but also providing specialised technical training and workforce development services to the wider industry.
Tools
Training
Bespoke training
If you have specialised training needs not well catered for by the commercial training market, get in touch to discuss our bespoke training options. We can develop courses tailored to your specific requirements to ensure you get the best return on your investment.
Whether you need a one-off training course covering a specific topic in detail, or a comprehensive training programme covering a broad range of topics and skills, we can develop a bespoke solution to meet your needs. With decades of industry experience researching and developing for a range of platforms, including Windows, Linux, Android, iOS and embedded devices, our team are able to develop offerings which focus on the critical skills needed by our industry, skills often overlooked by more mainstream providers.
Blog
Ghidra Angr Integration Tool - Symbolic Execution for serpentine monsters!
We’ve created AngrIntegration
, a Ghidra plugin that integrates the popular symbolic execution suite
angr
. You can symbolically execute any architecture that Ghidra can load, using the same pcode
representation that
Ghidra uses internally! Using the plugin, most aspects of angr
can be controlled using the GUI.
Ghidra Stack String Explorer
We have released a Ghidra plugin to make finding and reading stack strings easier, and better integrated with other string analysis
Ghidra Deep Links
We’ve released a plugin for Ghidra which allows you to create URIs for a place in the disassembly or decompilation. We use this to collaborate on reversing projects and to make reverse-engineering notes more useful.
LLEF - LLDB Enhanced Features
Today we are announcing the release of LLEF (pronounced ɬɛf - “hlyeff”) a tool similar to GEF to enhance the debugging experience of LLDB for reverse engineering and vulnerability research tasks.
Binder Tracing Part 2 - Extracting and Parsing the data
In the first part of this article, we saw how Android’s Binder subsystem works internally, and how we can determine the structure of a captured Parcel by analysing the AOSP source code. Now we will see how to extract this data from a running system and display it in a live tracing tool.
Binder Tracing Part 1 - Understanding Binder structures
We challenged one of our Cyber First summer placement students to build a tool for live-tracing calls through Binder, Android’s IPC mechanism. In this post they explain what’s necessary to understand and extract the data flowing through Binder.