Services Research About Contact
φhisecurity.io — about
We think like
the adversary.
φ

Replace this paragraph with your background story. Who founded φhisecurity, where did they come from, what is the origin of the name?

A second paragraph if needed. Talk about your journey, your methodology, or what distinguishes your approach from others in the field.

Years active
CVEs disclosed
Engagements
Penetration Testing
Network, web application, physical
Reverse Engineering
Binaries, firmware, protocols
SDR / RF Research
Signal analysis and exploitation
Malware Analysis
Threat research, IOC development

Replace this with a statement about your approach, methodology, or values. What do you believe about security that others don't? What makes the way you work distinctive?

Interested in working together or want to learn more about our research?

Get in touch