Young hacker smiling

We hack your software

zero false positives

Expert intelligence + effective automation

Yellow puzzle missing one piece, shown in red

Reversing for mortals

Solving Yoire crackme average challenge

It’s hard to really know where to start when you’re new to hacking. When I first started to get into the hacking world I came across something called Reverse Engineering, the art of de-constructing some product followed by a detailed analysis and revision of its composition and its …



Hand touching the Wireless icon

Stupid neighbours using WEP

Solving Yashira WEP Security challenge

Wi-Fi security has not always been the best. The first attempt at securing Wi-Fi access points was termed Wired Equivalent Privacy (WEP). WEP is a security algorithm that was implemented on IEEE 802.11 wireless networks. The original 802.11 wireless standard was ratified in 1997 to include this enhancement …



Pyramids in the desert

Types of triangles

Solving CodeAbbey Pythagorean Theorem challenge

A triangle is a 3-sided polygon sometimes (but not very commonly) called the trigon. Every triangle has three sides and three angles, some of which may be the same. The sides of a triangle are given special names in the case of a right triangle, with the side opposite the …



Magnifying glass finding password in a set of binary data

Storing passwords safely

Solving Yashira hash challenge 3

By the end of the year, we witnessed a huge increase in the amount of attacks that extracted large quantities of personal information, emails and passwords. Even one of the biggest email services, Yahoo, suffered an attack by cyber-criminals and they robbed more than 500000 accounts, in doing so, accessing …




Service status - Terms of Use