Palindrome: exe, dll crypter
All-in-one software for software protection against reverse. Unique technics. No dependencies. Low-level languages.
IP buyout: starting €3,000,000
We don't hunt for clients. We only work with close to us circle of people OR under interesting for us projects for high price
Mail : [email protected]
Tox/Jabber/Matrix : on demand
POI
Extract and analyze runtime data and proprietary formats, exposing hidden logic, protections, and vulnerabilities
From €5,000 — €25,000 base + €10,000 – €250,000 impact-based fee
Analyze suspicious files and behaviors across engines, assess risk levels, and generate detailed threat reports
From €3,000 — €15,000 base + €5,000 – €50,000 per high/severe threat class
Real-world attacks to test defenses, uncover vulnerabilities, and improve detection, response, and recovery
From €15,000 — €120,000 base + €25,000 – €500,000 success fee based on validated impact
How attackers exploit human habits, enabling early detection of anomalies, prevention of scams and follow-on losses
From €10,000 — TBD
Innovation, creating, testing, and improving technologies to solve problems, enhance security, and deliver scalable digital solutions.
From €10,000 — TBD
Optimize and reimplement algorithms and libraries with focus on a specific project needs. A bit of science.
From €10,000 — TBD
R&D
Advanced protection technologies that transform code into resilient, hard-to-analyze execution environments
All-in-one software for software protection against reverse. Unique technics. No dependencies. Low-level languages.
IP buyout: starting €3,000,000
A binary-level virtualization solution that protects executables by obscuring logic and preventing reverse engineering
IP buyout: €500,000 – €1,200,000
Virtualization at the LLVM intermediate representation level, transforming code into a protected form that resists analysis and tampering
IP buyout: €1,000,000 – €3,200,000
Pantera — source code protection through virtualization, concealing algorithms and logic before compilation to reduce risks of leaks and copying
IP buyout: €150,000 – €400,000
R&D
Deep analysis of binaries and low-level systems to extract hidden logic, break protections, and understand software at its core
a proprietary toolkit for runtime data extraction, enabling analysis of application behavior and vulnerability discovery even when code is heavily obfuscated
Not for sell. Internal use only
an advanced analyzer designed for proprietary formats, encryption schemes, and non-standard file structures, enabling deep inspection and structured data interpretation
IP bayout: €150,000 – €300,000
pecialized reverse engineering for BIOS systems, focused on extracting master key algorithms and enabling key generation across multiple brands, versions, and chipsets
Price per unit based on chip
R&D
In-house development and optimization of cryptographic systems and algorithms for performance, security, and future resilience
a redesigned cryptographic system with custom hashing and post-quantum mechanisms, built to resist modern attacks and intensive computational analysis
Sources buyout: €50,000 – €100,000
Optimized implementations of RSA, ChaCha, and ECC, delivering improved encryption performance while maintaining strong security and reliability
Not for sell at the moment. Internal use.
a custom memory compression algorithm for small-scale data, providing significantly higher performance compared to conventional compression methods
IP bayout: TBD. Internal use for now.
a tool for entropy analysis, pattern detection, and dependency mapping, supporting advanced research in cryptography and data security
Internal use for now.
R&D
Automated environments for large-scale malware analysis, classification, and threat scoring across multiple engines.
an automated system for evaluating malware threats, assigning risk scores based on behavior, signatures, and advanced threat analysis models.
NOT FOR SELL
a platform for multi-engine file scanning, analyzing samples across 20+ antivirus engines and generating comprehensive, structured security reports.
NOT FOR SELL
R&D
Systems designed to analyze behavior, communication, and data patterns to detect threats and uncover hidden risks.
Call Center recordings speech-to-text analyser. Accept search by the keywords and context
Internal use for now.
Detects the exact rules that cause an email to be flagged as spam, explains the reasons, and suggests improvements to increase deliverability
Internal use for now.
Tool for analyzing emails and attachments (PDFs, images, movies, sound), by the context and keywords
Internal use for now.
R&D
Custom-built tooling for real-world attack simulation, vulnerability discovery, and security validation under live conditions.
Analyzes traffic in real time, detects attacks, and helps understand attackers’ flow for proactive defense, including counter-attack
Internal use for now.
Automatically detects vulnerabilities in online-systems, groups by business domains using AI, generates convenient ready-to-action reports.
Internal use for now.
MITM-attack tool for client-server vulnerabilities testing with implemented top-antidetect technics that allows to make tests even on a production environmet
Internal use for now.
Get in Touch
Use common contacts or request tor-protected chanels
Mail : [email protected]
Tox/Jabber/Matrix: on demand