Xipiter
  • Home
  • Training
    • Software Exploitation Via Hardware Exploitation
    • Practical ARM Exploitation
    • Practical Android Exploitation
    • Training Testimonials
    • 2018 Public Training Info
    • 2017 Public Training Info
    • 2016 EU Public Training Info
    • 2015 EU Public Training Info
  • Products
    • Int3.cc
    • SyncStop / USB Condom
    • Tally / Osprey
  • Research
  • Blog
  • Contact
  • About

expertise.

rectitude.

service.

Xipiter helps its clients audit and secure their software, hardware and mobile solutions. How can we help you?

We provide our clients with a range of software security services but we specialize in software exploitation, hardware and software reverse engineering, code-audits, embedded systems, and operating system internals. Members of Xipiter's team regularly speak and present research internationally at industry conferences and we've co-authored books on exploitation, reverse engineering, and embedded systems.

NEW TRAINING DATES ANNOUNCED!

VISIT THE TRAINING PAGE TO LEARN ABOUT CLASSES WE OFFER.

VISIT THE SERVICES PAGE TO LEARN HOW WE CAN HELP YOU.

VISIT THE PRODUCTS PAGE TO SEE WHAT WE MAKE.
Latest Posts
  • JTAG Explained (finally!) 
  • Using Xipiter's "Shikra" to hack embedded devices 

Upcoming  Public Trainings
  • Practical Android Exploitation (Black Hat 2018 & NYC)
  • Software Exploitation Via Hardware Exploitation (Black Hat 2018 & NYC)

Recent Trainings
  • Software Exploitation Via Hardware Exploitation SOLD OUT  at Black Hat 2017!
  • Practical Android Exploitation SOLD OUT at Black Hat 2017!

Learn more about what's going on in our Newsletters.
For up-to-date news on Xipiter register for our newsletters or download them. 
toll-free: 1.855.XIP.ITER main: 1.646.783.3999 fax: 1.917.746.9832 email: info (@) xipiter (dot.) com 
© Xipiter 2010-2019