Cryptography is the science of encrypting and decrypting data. We, at bi0s, aim to learn the concepts of data confidentiality, data integrity, authentication and non-repudiation which are the core principles of modern-day cryptography through CTF’s and other ethical hacking competitions.

Binary Exploitation

From exploring the depths of a binary, to exploiting the deepest of the vulnerabilities , we the pwners at team bi0s are dedicated to find and exploit the vulnerabilities and gain Remote Code Execution. We actively take part in ctfs to hone our skills , learn new techniques and gain insight on the advancements in exploitation.

Digital Forensics

With technology continuing to grow year after year and everything turning to digital format, computer forensics is a field that Unravels the mysteries of the footprints left behind by attacks. We investigate these artifacts by recreating the attacks and also by solving similar simulations from CTFs.

Reverse Engineering

Reverse engineering is the art of cracking such softwares by tracing serial numbers or other data that facilitates examining the binary and automating to find the result. Our work involves sophisticated measures to decompile windows and linux executables but often extends to neural networks, unicorn engines and many more!

Web Exploitation

Advancements in web applications, web services and other technology have changed the way we access and share information.The scenario where web exploitation plays a role “The art of exploiting a bug in application code to gain some higher privileges”. We, at bi0s aims to be masters at exploiting and to make a secure World of Web which is Wide

Android Exploitation

Android app security is the measure and means of defending Android device apps from digital fraud in the form of malware, hacking, and other criminal manipulation. We at bi0s aims to discover and exploit Android vulnerabilities.