Modern cyberwarfare instruments

creating high-end tools + resources for security researchers

Explore Request a solution

Our tools



Multiplatform, flexible and covert C2 infrastructure with tunneling capabilities for pentesters

Learn more


A library that aids in construction of self-spreading binaries over the local network

Learn more


A tool providing various methods useful for malware development in Golang

Learn more


Collection of various scripts for pentest-related tasks

Learn more


Use Docker Containers as WSL distros without the Docker as a dependency

Learn more


A local LKM rootkit loader/dropper that lists available security mechanisms

Learn more


Well-equiped NixOS container preloaded with tools for infosec research and collection of nix-shells for security auditors

Learn more

Custom tools


Level your auditing capabilities

Gain a deep and coherent insight into the security posture of your organization. Simulate real-world exploitation scenarios guided by artisan tools tailored for security auditors, TAO operators and SOC centers.

Suited for your needs

Our carefully crafted solutions can be fully customized according to your requirements. Send us an e-mail outlining your expectations, and we will provide you with a quote.

Languages we often use
  • Asm
  • Golang
  • Python
  • Bash
  • Nix
  • C
  • Ruby
  • PHP
Software we specialize in
  • Stagers and droppers
  • LAN scanners
  • C2 channels
  • Shellcodes
  • Webshells
  • Payload generators
  • Keyloggers
  • Implants
Other services
  • Code obfuscation
  • POC to Metasploit
  • Code review
  • Security advisory
  • Firewall configuration

Get in touch