• Français
  • English

Your strategic outsourced R&D partner for defensive and offensive security

Because your innovations require excellence, an applied research and tailored approach.

Cybersecurity services, consulting and training

QLabs’ cybersecurity audit and services offer a distinctive approach that integrates both defensive and offensive security strategies, fortifying organizations against evolving cyber threats. Through meticulous security assessments, audits, testing and vulnerability research, we empower clients to better anticipate security risks in their products and solutions. Our expertise encompasses security consulting and services, vulnerability research, and advanced cryptography, positionning us as the ideal partner for safeguarding your digital landscape.

At Quarkslab, we don’t just provide security consulting and services; we offer comprehensive protection against potential risks based on more than 12 years in reseach and developement (R&D). This ensures that your cybersecurity defenses are not only resilient but also continually adapting to the dynamic threat landscape and the state of the art practices.

Technical blogposts on a great variety of R&D topics, such as cryptography, reverse engineering, vulnerabilities, and more, written by our engineers
Check out our blog

In-depth skills and know-how

  • Blockchain
  • Cryptography
  • Embedded Systems
  • Low cost HW attacks
  • Reverse Engineering
  • Code review
  • Development
  • Fuzzing
  • Offensive and Defensive
  • Secure SW Architecture

Pentest offers

Discover efficient and standardized offers to optimize the security of your assets, networks, WI-FI infrastructures and mobile applications.

External Assets discovery

Web Pentest

Mobile App Audit

Internal Pentest

Managing IPs, virtual hosts, domains, and sub-domains online is tough, especially for large enterprises. Ready to regain control of your Internet assets?

Ensure compliance with standards via detailed reports. Test your web applications’ security with black, grey, or white box penetration testing against threats.

Check the robustness of your mobile applications through a surface penetration test in a black / grey / white box to guarantee a level of security against external threats.

Assess internal infrastructure by targeting domain controllers, examining trust, verifying network controls, and ensuring proper updates deployment.

Enterprise Wifi Audit

Configuration Audit

Red Team

Phishing campaign

Do you need to assess the resilience of your internal Wi-Fi infrastructure to ensure secure internal access for employees and provide reliable Internet access?

Planning server migration or assessing app configs and network gear? We ensure security standards, policies, and best practices are followed

Test your security’s strength with our Red Team, simulating advanced, determined attackers with limited knowledge of your environment.

Test your resilience to phishing with realistic simulations, where attackers use sophisticated tactics to deceive employees with limited info.

Trainings​

Our trainings

  • Android Applications
  • Practical Car Hacking
  • Binary fuzzing
  • iOS Application Security and OS Internals
  • Reverse engineering like a pro

How to register and attend a training

  • Our training can be purchased by customer for internal needs. We provide the content (presentation), the tools and the experts to teach the training. If necessary, we can also organize the logistic (finding and booking an appropriate location).

  • We also deliver these training in conference program. To get registered, please refer to the conference website.

In-house open-source tools

Instrumenting executable formats

Multi-platform library to parse, modify and abstract ELF, PE, MachO and other executable formats, injecting code or unpacking without focusing on the details.

Tool to observe program execution

Cross-platform, cross-architecture dynamic binary instrumentation framework to observe a program during runtime and automate data collection and processing.

Dynamic symbolic execution framework 

Cross-platform, cross-architecture dynamic binary analysis framework providing symbolic engine, taint analysis and AST representations of instructions.

Resources

Binbloom blooms: introducing v2​

Quarkslab's Github