Reverse-engineering
Synacktiv relies on a team of reversers able to test the security of software solutions - whether obfuscated or not - without having the corresponding source code
Our versatile experts can audit consumer as well as industrial programs and operating systems, regardless of their intended media: computer, phone, networking or industrial equipment, IoT, etc.
EXAMPLES OF ENGAGEMENTS
- Blackbox analysis of a proprietary DRM solution
- Reverse-engineering of a decoding video stream kernel module, as part of a security assessment
- Exploitation of a use-after-free vulnerability allowing privilege escalation on the audited system

Tools
IDA Pro, Ghidra, Binary Ninja, jeb, BinDiff, x64Dbg, Windbg, Frida,
QEMU, LLVM, AFL, libFuzzer
QEMU, LLVM, AFL, libFuzzer
Latest articles
Quantum readiness: Hybridizing signatures
In light of new legal requirements being enacted in many countries for software providers to adopt hybrid post-quantum cryptography, Synacktiv has initiated research into these novel cryptographic alg
...
Exploring GrapheneOS secure allocator: Hardened Malloc
GrapheneOS is a mobile operating system based on Android and focusing on privacy and security. To enhance further the security of their product, GrapheneOS developers introduced a new libc allocator :
...
Extraction of Synology encrypted archives - Pwn2Own Ireland 2024
This article features the reverse engineering of Synology encrypted archives extraction libraries and the release of a script able to decrypt these archives. The tool is available on Synacktiv's GitHu
...