Tailored Malware Reverse Engineering (RE

Put Narf’s Reverse Engineering (RE) experience to task for your malware reverse engineering needs.

Need to emulate a Command & Control (C2) infrastructure to batch-uninstall or redirect bots? Narf’s got you covered.

Need to know what the attacker was after? We don’t know the attackers, but we can ask their code.

Need to discover attacker Tools, Techniques and Procedures (TTPs)? Just call Narf.

Contact Us