Tailored Malware Reverse Engineering (RE
Need to emulate a Command & Control (C2) infrastructure to batch-uninstall or redirect bots? Narf’s got you covered.
Need to know what the attacker was after? We don’t know the attackers, but we can ask their code.
Need to discover attacker Tools, Techniques and Procedures (TTPs)? Just call Narf.