03

Vulnerability Research

Vulnerability Research
01

Fermium-252

Cyber Threat Intelligence Database

A comprehensive platform preparing for cyberattacks from state-sponsored hacking organizations by providing advanced intelligence and accurate security countermeasures.

Exclusive PoC & Functional Exploits

Mitigation bypasses and exploitation techniques for each system with actual functional exploits, along with the latest 1-day vulnerability PoCs available only on Fermium-252.

Database of Over 400 Threat Intelligence

More than 400 sources of vulnerability intelligence, including root cause analysis, patch codes, and proofs of concept for 1-day vulnerabilities found in various operating systems and applications.

Continuous Updates Providing the Latest Intelligence

Keeping vulnerability reports updated with ongoing research to support high level technical skills and volume of detailed.

fermium-image
02

QueryX

Coming soon

Pattern-based Vulnerability Analysis Tool for Binaries

Researcher's arsenal for identifying vulnerabilities in binaries and vulnerable patterns within code, through an advanced static analysis engine.

Diverse Analysis Tools

  • Abstract Syntax Tree (AST) Matcher

  • Data-Flow Analysis

  • Taint Analysis

  • Symbolic Execution

Simplified Interface

  • Visual Studio Code Extension

  • Code Review and Analysis Support

User-friendly Query Language and Features

  • Javascript language and syntax

  • Thorough assessments through a Theori-made advanced analysis engine

03

Our Clients

vr-partners-image
vr-partners-image
vr-partners-image
go-top-arrow