Home
Consulting
Advisories
Software
Articles
Contact

Reverse Engineering Services

Whether the program in question is a typical portable executable or a position independent shellcode within a video file, we have the skills to disassemble it and understand its purpose. If the opacity of a program or file is proving to be problematic, contact us.

Exploit Analysis

Quite often, modern malware is delivered in a clandestine manner by leveraging software exploitation. This allows malicious software to be delivered through common vectors such as file formats and network protocols.

Attacks of this nature present a unique challenge in that the "container" exploit must first be reversed and understood before the payload can be properly identified and analyzed. As might be expected, the act necessitates a deep understanding of software exploitation techniques and methodologies. We can help.

Contact Us


Submit







Copyright © 2018 AutoSec Tools LLC