-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathindex.html
More file actions
48 lines (42 loc) · 3.03 KB
/
index.html
File metadata and controls
48 lines (42 loc) · 3.03 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
<!DOCTYPE html>
<html>
<head>
<meta name="viewport" content="width=device-width">
<title>rebyte AB</title>
<style>
a { color: #ffffff; }
a:visited {color: #ffffff;}
a:hover { color: #ffa51e;}
</style>
</head>
<body style="margin: 0; background-color: #222222; padding-top: 7.5vh;">
<div style="margin: auto; width: 32vw; background:linear-gradient(to top right, #244b67, #41779d); border: 1px solid #777777">
<div style="padding: 1vw; width: 30vw; overflow: auto; font:bold 7.5vw arial; color: #ffffff">
<div style="border: 0.3vw solid #ffffff; padding: 0.75vw; overflow: auto">
<div style="float:left; color: #244b67; background-color: #ffffff; padding-left: 1.5vw; padding-top: 1.5vw; padding-bottom: 1.5vw;">re</div>
<div style="float:left; padding-top: 1.5vw; padding-bottom: 1.5vw;">byte</div>
</div>
</div>
<div style="padding-left: 1.5vw; padding-right: 1.5vw; padding-bottom: 1.5vw; width: 29.5vw; text-align: right; color:#bbbbbb; font: 1.2vw arial">
Excellence in Engineering
</div>
</div>
<div style="padding-top: 3vh; margin-left: auto; margin-right: auto; width: 37.5vw; border-bottom: 1px solid #cccccc"> </div>
<div style="padding-top: 3vh; margin-left: auto; margin-right: auto; width: 57vw; font: 1.5vw arial; color: #dddddd; text-align: justify;">
<p>rebyte AB is a small software and computer security consultancy located in Sweden. We specialize in solutions to unique problems that require
great technical depth.</p>
<p>We've been a part of writing low latency software for critical systems. As well as mapping out and figuring out low latency paths through
complicated and ever changing network topologies.</p>
<p>We thrive at low level software development as well as auditing. With and without access to source code. We've identified vulnerabilities in
software belonging to some of the largest vendors on the planet, such as Samsung, Apple, Qualcomm and Ericsson. In general we focus on low
level aspects of systems, such as trusted execution environments, secure boot and secure elements.</p>
<p>In general we always produce exploits for found vulnerabilities. Historically we've written exploits for bootrom software, bootloader stages,
Window software, the Linux kernel, Android and iOS.</p>
<p>We've also worked with DeFI and auditing of smart contracts and have experience with solidity and common pitfalls there.</p>
<p style="padding-top: 4.5vh; text-align: right;"><a href="mailto:peter@rebyte.se">contact</a></p>
</div>
<div style="margin-top: 45vh; color: #aaaaaa; text-align: right;">
<p style="font:1vw arial; padding:0; margin:0">rebyte AB, Org. nr: 559342-6157, VAT: SE559342615701</p>
</div>
</body>
</html>