REverse Tactics

Our Services

Can an attacker recover the data from a stolen computer? Does your last IOT device could compromise your security? Specialized in offensive security we can help you answer these questions. With an in-depth look at your systems and by replicating the steps taken by attackers we allow you to ensure that you are protected from threats.

Disk Encryption Audit

Ensure that data present on your computers are securely stored and cannot be retrieved from a stolen laptop.

Vulnerability Research

Find real vulnerabilities and weaknesses in your software which could be used by an attacker for compromising your security.

IOT Assessment

Make sure that your embedded devices are secure and will not allow an attacker to gain access to your network.