Not a vulnerability scan but real hackers ...

We’re Certified


Whatever you hire us for you can be confident that we know how to do the job, and we know how to do it well. We hold certificates in all the work that we do to prove it.

  • GIAC Certified Penetration Tester (GPEN)

  • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)

  • Offensive Security Certified Professional (OSCP)

  • GIAC Certified Intrusion Analyst (GCIA)

  • Certified Information Systems Security Professionals (CISSP)

  • ISO/IEC 27001 Lead Auditor

  • Certified Information Systems Auditor

  • Certified in Risk and Information Systems Control

We Do Research


We are constantly doing research. We take things apart and see how they work. When we are done, we see if we can break them. It’s that simple. If we find something interesting, we share it. You can find some of the things that we have shared in PC World, Computer World, Network Work, IT Work, Light Reading, SDXCentral, and Techtarget.

We Discover Zero-Days


During our research, we often find vulnerabilities. Many we can tell you about such as Opendaylight, Cumulus Linux, and rConfig. Others we can’t like the critical issue that we found in the EC-Council Website. Public or not, if there are vulnerabilities there, we will find them.

We Present Internationally


If it is really cool, they let us present it. We’ll show up at Defcon, Blackhat, and conferences all over Europe and Asia.

SANS Top-20




Top Ten Network Security Tips


Wondering what the "best practices" are for securing your network? There is a very informative document called "The 60 Minute Network Security Guide" on the National Security Agency Web site (www.nsa.gov). Here's a brief summary ...