Protecting Your Software , Ensuring Security.

Expert vulnerability research, protection, and tailored security solutions to safeguard your software.

Our Advisories

Because our dedication to protecting software makes a difference.

  • CVE-2024-54534

    Apple WebKit

    WebCore - Use After Free

    CVE-2024-54534

    Apple WebKit

    WebCore - Use After Free

  • CVE-2024-7025

    Google Chrome

    Blink Layout – Integer Overflow

    CVE-2024-7025

    Google Chrome

    Blink Layout – Integer Overflow

  • CVE-2024-9121

    Google Chrome

    V8 – Inappropriate implementation

    CVE-2024-9121

    Google Chrome

    V8 – Inappropriate implementation

  • CVE-2024-7967

    Google Chrome

    Blink Fonts – Heap buffer overflow

    CVE-2024-7967

    Google Chrome

    Blink Fonts – Heap buffer overflow

  • CVE-2024-7535

    Google Chrome

    V8 – Inappropriate implementation

    CVE-2024-7535

    Google Chrome

    V8 – Inappropriate implementation

Our Services

Consultancy & Fuzzing

Specialized in fuzzing and consulting to detect high-impact vulnerabilities.

Vulnerability Research

Explore our tailored research to uncover hidden vulnerabilities and threats.

Expert Software Hardening

Specialists in bypass protection, adding top-tier defenses to your software.

Custom Fuzzing Development

Developing custom fuzzers tailored to your specific software security needs.

From The Blog

  • We are excited to announce the discovery and reporting of two critical vulnerabilities in the Google Chrome browser that impact the JavaScript engine “V8” and the rendering engine “Blink.” The assigned CVE identifiers are CVE-2024-7534 and CVE-2024-7535. These vulnerabilities[...]

  • Code Coverage is a technique used to obtain information about which internal code of a binary is being executed when it is running. In Fuzz Testing, we can receive this feedback from the Target on each execution, allowing us[...]

  • The Executor is the component of a fuzzer responsible for running the test file (Testcase) in the software being tested (Target). The ideal objective when designing an Executor is to execute Testcases as quickly and efficiently as possible, without[...]

Hello! We’re experts in vulnerability research and advanced software security.

We have experience in detecting and addressing high-impact security flaws in software.