Contact Us
Vulnerability Research
Code auditing
Penetration Testing
Binamuse specializes in information security research and security consulting services, providing reliable vulnerability research on multiple platforms and OS environments as well as black box testing, code auditing and reverse engineering services.

Founded in 2008 by Felipe Andres Manzano, based in Cordoba Argentina, worked with clients from all over the world.

The Binamuse staff is powered with a focused set of professionals with solid expertise in information security, networking and software engineering, with both corporate and academic global exposure.

The team at Binamuse is led by Felipe Andres Manzano. He is an information security researcher who has being working in the industry since 2004. His previous employers included Flowgate Security Consulting and Core Security. He is also a PHD candidate at the local university with several international publications.

With qualifications in software engineering, networking and computer science, the Binamuse team hard work daily discovering and analyzing new vulnerabilities.

Staff members are regular contributors to the Open Source Community and certified as Penetration Testing Professionals.

Please don't hesitate to contact us if you have any inquiry. We provide a wide range of services to meet all of your information security needs. We will get back to you in a timely manner.

Please encrypt any sensitive information with the Binamuse PGP public key.

General Inquiries: Whant to join us?:

Vulnerability research includes finding new and unpathced security vulnerabilities in popular and widely deployed software, helping major vendors to eliminate security flaws in their products.

Since 2008 Binamuse staff discovered and helped to publicly disclosure several vulnerabilities. As collateral work of our research, we usually post detailed technical data on the blog and share BSD licensed tools like the OPAF! PDF disassembler and the

Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. The goal of ethical hacking is to determine how to break in or create mischief with the present programs running, but only at the request of the company that owns the system and specifically to prevent others from attacking it. Ethical Hackers use the same techniques and tactics as those used by illegal hackers to breach corporate security systems. The end result is the company's ability to prevent an intrusion before it ever occurs. Binamuse consulting services on ethical hacking helps organizations to keep their systems and information as secure as possible.

A penetration test or pentest is a proven method of evaluating the security of your computing networks, applications and infrastructure by simulating an attack from malicious outsiders and malicious insiders. Either defending sensitive business information, or applying for industry standard certifications or if you are pushing up the security soundness of your next release, Binamuse can help you messure the risk and planning the fix.

During a Binamuse Penetration Test we combine both manual and automated techniques to help ensure your sensitive data is properly protected and that compliance requirements are being met.

After conducting a penetration test we provide a comprehensive report telling you exactly where your vulnerabilities are and how to secure your business against real attacks. These reports include recommendations outlined in the testing overview and detailed technical feedback to mitigate or solve the security findings. Thats helps your organization to saving time and money.

Binamuse team manually inspect your application source code looking for bugs, security breaches or violations of programming conventions.

The scope, intensity and aggressiveness of the secure code audit will depend then on the risks involved, and the time assigned for completion.

Performing a code review is one of the best ways to verify that secure coding practices were used during the development of your applications. Both whether the application was built in-house or by an outside contractor.

We evaluate the potential risk on your application and given the result we define the method to follow during the audit.

Please, place your inquiry here:

Send Cancel