Reverse-engineering
Synacktiv relies on a team of reversers able to test the security of software solutions - whether obfuscated or not - without having the corresponding source code
Our versatile experts can audit consumer as well as industrial programs and operating systems, regardless of their intended media: computer, phone, networking or industrial equipment, IoT, etc.
EXAMPLES OF ENGAGEMENTS
- Blackbox analysis of a proprietary DRM solution
- Reverse-engineering of a decoding video stream kernel module, as part of a security assessment
- Exploitation of a use-after-free vulnerability allowing privilege escalation on the audited system

Tools
IDA Pro, Ghidra, Binary Ninja, jeb, BinDiff, x64Dbg, Windbg, Frida,
QEMU, LLVM, AFL, libFuzzer
QEMU, LLVM, AFL, libFuzzer
Latest articles
Quantum readiness: Hybridizing key exchanges
Following our previous article on signatures hybridization, this article covers the basics of hybridizing your key exchanges to ensure maximal security of your data.
...
LLM Poisoning [1/3] - Reading the Transformer's Thoughts
Your local LLM can hack you.
This three-part series reveals how tiny weights edits can implant stealthy backdoors that stay dormant in everyday use, then fire on specific inputs, turning a "safe" off
...
Quantum readiness: Hybridizing signatures
In light of new legal requirements being enacted in many countries for software providers to adopt hybrid post-quantum cryptography, Synacktiv has initiated research into these novel cryptographic alg
...