Offensive Operation
Web site:
We focus on uncover any threat actor who acts behind web sites used to scam/harm other people or selling/promoting illegal contents. The process involves using clandestine-HUMINT and exploiting techniques.Onion site:
We focus on uncover any threat actor who acts behind TOR onion sites used to scam/harm other people or selling/promoting illegal contents. The process involves using clandestine-HUMINT and exploiting techniques.Digital persona:
We focus on uncover any threat actor who acts behind a digital "persona" (social profile or e-mail address) who is scamming/harming other people or selling/promoting illegal contents. The process involves using clandestine-HUMINT and exploiting techniques.
Rules of Engagement
- Mission: Attacking Threat Actor's digital assets in order to deanonymize them
- Modality: Black-box
- Methodology: OWASP, OSSTMM, CEH, PTES, MITRE ATT&CK, NATO
- Location: From a remote side
- Privacy: NDA, encrypted deliverables, secure-deletion
- Deliverable: Report with a description of the entire activity and artifacts collected
- Price: Get a quote