Description
Targeted research to identify gaps in security controls and to evaluate specific security products or services. The research covers multiple domains and focuses on uncovering not only 0 day vulnerabilities but also developing new attack vectors, new techniques for exploit development, defending critical assets and investigating security breaches.
Clients can pick the required subject/topic/discipline and commission research, retaining full control over the budget and costings.
We offer a flat fee rate to cover any research related to the Information and Cyber Security. The following deliverables are included within pricing:
A research paper demonstrating the approach, methodology, techniques and proof of concept exploits developed specifically to cover scenarios requested by clients.
Daily/weekly catch-up session to update clients on progress.
Demo sessions – live demonstrations to present findings of research to clients.
Walk-through videos and screenshots.
If applicable, payloads and fully working proof of concept exploit(s) for unknown vulnerabilities.
If applicable, working proof of concept exploit(s) for known CVE registered vulnerabilities that do not have publicly available exploit code.
Duration of each research project will be decided by customers. Typically it varies from 1 to 20 days.
Customer Instructions
Please customise your research package and place the order. During the checkout use the “Order notes” to add additional comments related to your order. Once the order has been placed, we will contact you to discuss the details with you.
If you prefer to speak with us first, please give us a call to discuss your requirements before placing the order so that we can guide you through the process, and answer any questions that you may have.