WUNDERWUZZI

Software that matters.

Values

MISSION: Create meaningful software and perform outstanding security research and consultation.

VISION: Make the world a better place.

SERVICES


SECURITY CONSULTATION

Artificial Intelligence and Machine Learning - Robustness Testing

GAME DEVELOPMENT



Portfolio

Security Services, Projects and Research

Husky AI

Artificial Intelligence and Machine Learning

Are your ML models robust to withstand attacks with fake data? The above husky does not exist and was created via adversarial machine learning to trick image classification models.

Koiphish

Koiphish

Train and protect your organization

Cryptbook

Cryptbook

Research ahead of its time

Games and Applications

Wonder Witches

Wonder Witches

Yes, we built Wonder Witches. Hundreds of thousands of downloads.

Google Play Store

Apple App Store

Amazon

HERO - Rescue Vicky

HERO - Rescue Vicky!

A challenge

What customers say

"Wonderful game!"
"HILARIOUS! Great game. Lots of fun & laughs!"
"I love the sound effects! This is a fun and addictive game."
"Very Hilarious and AWESOME! The game is really funny and it's VERY addicting! I can't wait for more updates!"


AVAILABLE NOW

CYBERSECURITY ATTACKS - RED TEAM STRATEGIES

A practical guide to building a penetration testing program having homefield advantage

   


In over 500 pages the book starts by guiding you through the phases of establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive red team operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.

Key Features
  • Build, manage, and measure an offensive security program
  • Leverage the homefield advantage to stay ahead of your adversaries
  • Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets

Available as Paperback and E-book:

BLOG

Stay up to date with latest research and projects

CONTACT

In need of a penetration test, a security assessment or training?

Reach out.

office@wunderwuzzi.net

Seattle, WA US

WUNDERWUZZI, LLC