About Us

We're a specialised supplier providing cyber security research and engineering services. Our team has a long and successful track record of delivering complex technical research and high quality software products across a range of platforms and technologies.

We understand that even the cleverest technical solution is of little value if it doesn't integrate and cooperate with a customer's wider ecosystem. That's why we like to work closely with customers so that we fully understand their requirements and constraints, enabling us to build systems that can deliver impact and value.

We're committed to helping build an inclusive, diverse and highly skilled cyber security workforce. We'll be recruiting, training and empowering our own brilliant consultants but also providing specialised technical training and workforce development services to the wider industry.

Tools

We combine our research skills with our development experience to create tools that make us better at both! And we believe that if we can help other people do security research than everyone benefits, so when possible we like to release things as open-source. Here are some of our tools, and you might find more on our github page.

Training

Bespoke training

If you have specialised training needs not well catered for by the commercial training market, get in touch to discuss our bespoke training options. We can develop courses tailored to your specific requirements to ensure you get the best return on your investment.

Whether you need a one-off training course covering a specific topic in detail, or a comprehensive training programme covering a broad range of topics and skills, we can develop a bespoke solution to meet your needs. With decades of industry experience researching and developing for a range of platforms, including Windows, Linux, Android, iOS and embedded devices, our team are able to develop offerings which focus on the critical skills needed by our industry, skills often overlooked by more mainstream providers.


Blog

Ghidra Deep Links

We’ve released a plugin for Ghidra which allows you to create URIs for a place in the disassembly or decompilation. We use this to collaborate on reversing projects and to make reverse-engineering notes more useful.

LLEF - LLDB Enhanced Features

Today we are announcing the release of LLEF (pronounced ɬɛf - “hlyeff”) a tool similar to GEF to enhance the debugging experience of LLDB for reverse engineering and vulnerability research tasks.

Binder Tracing Part 2 - Extracting and Parsing the data

In the first part of this article, we saw how Android’s Binder subsystem works internally, and how we can determine the structure of a captured Parcel by analysing the AOSP source code. Now we will see how to extract this data from a running system and display it in a live tracing tool.

Binder Tracing Part 1 - Understanding Binder structures

We challenged one of our Cyber First summer placement students to build a tool for live-tracing calls through Binder, Android’s IPC mechanism. In this post they explain what’s necessary to understand and extract the data flowing through Binder.