Data as a service.
Simple, custom web scraping tools for researchers, growth hackers, marketing & sales teams.
Our extensive knowledge goes not only on the software plane of Operating System's security, exploitation and reverse engineering of the most complex applications, but also on the hardware domain including embedded devices security such as firmware vulnerability ...
Mobile Based Identity Security
VU Security solutions can be incorporated into any of the authentication processes that use computer systems. Some of the most common which are used on a daily basis are: PCs’ Access, internal accounting systems, remote access through VPNs, Intranets, email, Home ...
Essential tool for managing guards and security
Guarnic assures that physical security (guards) comply with what clients pay for. Security companies can be sure there employees are doing there jobs. We make security companies more efficient by monitoring guard movement and generating automatic alerts in real ...
The referral community
Invitation App is a social network where people post their referral codes and collect rewards on autopilot.
Secure Cryptocurrency Applications Development
CoinFabrik specializes in cryptocurrency software development services. Our team has discovered several cryptocurrency vulnerabilities and published protocol improvements.
Simplifying Application Virtualization with SpyStudio
SpyStudio simplifies application virtualization packaging in technologies such as VMware ThinApp and Symantec Workspace Virtualization. As companies embrace application virtualization, packaging and troubleshooting in some cases has proven difficult and resource ...