-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
115 lines (115 loc) · 6.38 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>LESIS - Laboratory of Engineering Studies in Information Security</title>
<meta name="description" content="We are an applied security research firm, focused on developing effective offensive technology to support critical operations.">
<meta name="keywords" content="LESIS, lesis, lesis.lat, www.lesis.lat, vulnerability, research, hunting, exploit, development, fuzzing, analysis, zero, day, nday, intelligence">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="icon" href="assets/images/favicon-white.png" type="image/png">
<link rel="apple-touch-icon" href="assets/images/favicon-white.png">
<link href="assets/css/style.css" rel="stylesheet">
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.3/css/all.min.css" crossorigin="anonymous" referrerpolicy="no-referrer" />
<link rel="preconnect" href="https://fonts.googleapis.com">
<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin>
<link href="https://fonts.googleapis.com/css2?family=IBM+Plex+Mono:wght@300;400;500;600;700&family=IBM+Plex+Sans:wght@300;400;500;600;700&display=swap" rel="stylesheet">
</head>
<body>
<div class="container">
<div class="left-side">
<a href="#">
<img src="assets/images/logo-branco.png" alt="LESIS logo" class="logo-left">
</a>
</div>
<div class="right-side">
<!-- <div class="top-bar">
<h1 class="site-title">LESIS</h1>
<nav class="top-menu">
<ul>
<li><a href="https://blog.lesis.lat" target="_blank">BLOG</a></li>
</ul>
</nav>
</div> -->
<section id="header">
<h2 class="ibm-plex-sans-light">
<p>
We are an <b>applied security research entity</b>, focused on
<b>developing effective offensive technology</b> to support critical operations.
We propose solutions based on a thorough <b>attacker's perspective</b>
and a <b>research-based thinking</b>.
</p>
</h2>
</section>
<hr/>
<section id="research">
<h2 class="ibm-plex-sans-regular">CORE COMPETENCIES</h2>
<div id="items">
<div class="item">
<h3 class="ibm-plex-sans-regular">VULNERABILITY RESEARCH</h3>
<h3 class="ibm-plex-sans-light">
<p>
A detailed analysis of the attack surface of the product under test, taking into consideration
the security expectations, objectives and threat model.
In general, our approach of vulnerability research aims to verify the resilience of all components of the product
under test - typically, this service is composed of architecture review, supporting infrastructure testing,
application security, code review and reverse engineering, as well as the creation of bespoke tools such as
fuzzers and custom code static analyzers.
</p>
</h3>
</div>
<div class="item">
<h3 class="ibm-plex-sans-regular">RESEARCH & DEVELOPMENT</h3>
<h3 class="ibm-plex-sans-light">
<p>
Hard problems require unique solutions. We create tailor made tools for optimizing operation,
providing exclusive capabilities and tailored on-demand research to improve exploitation and post-exploitation tasks.
From high level design to low-level implementation.
In the past years our team are worked on projects around topics like: static analysis, fuzzing, data mining and other.
</p>
</h3>
</div>
</div>
</section>
<hr/>
<section id="about">
<h2 class="ibm-plex-sans-regular">OUR APPROACH</h2>
<h3 class="ibm-plex-sans-light">
<p>
At LESIS (Laboratory of Engineering Studies in Information Security), our focus is on applied research in offensive security technologies that underpin critical operations. Our team of engineers and researchers is dedicated to uncovering vulnerabilities, developing innovative solutions, and strengthening the security of organizations facing complex cybersecurity challenges.
</p>
<p>
With a deep understanding of the tactics, techniques, and procedures (TTPs) employed by attackers, we offer a unique perspective on protecting systems and infrastructures. We work closely with our collaborators, tailoring strategies to meet specific needs and objectives. Whether through vulnerability research, advanced exploitation techniques, or the development of custom tools for security assessments, our aim is to reinforce digital resilience and empower those involved to stay ahead of emerging threats.
</p>
<p>
Our commitment is to deliver world-class research, cutting-edge technology, and actionable insights that contribute to a safer digital landscape. At LESIS, we do more than assess security—we propel it forward.
</p>
</h3>
</section>
<hr/>
<footer>
<section class="ibm-plex-sans-light">
<ul class="social-icons">
<li><a href="https://www.instagram.com/lesis.lat/" target="_blank"><i class="fab fa-instagram"></i></a></li>
<li><a href="https://x.com/lesis_lat" target="_blank"><i class="fab fa-twitter"></i></a></li>
<li><a href="https://github.com/lesis-lat" target="_blank"><i class="fab fa-github"></i></a></li>
<li><a href="https://www.linkedin.com/company/lesis-lat/" target="_blank"><i class="fab fa-linkedin"></i></a></li>
</ul>
</section>
<h4 class="ibm-plex-sans-light">
<p>[email protected] - www.lesis.lat</p>
<p>São Paulo | Buenos Aires | Lisbon</p>
<p>Laboratory of Engineering Studies in Information Security - 2025</p>
</h4>
</footer>
</div>
</div>
<script src="assets/scripts/main.js"></script>
<script async src="https://www.googletagmanager.com/gtag/js?id=G-BF7S2MHBGH"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
gtag('js', new Date());
gtag('config', 'G-BF7S2MHBGH');
</script>
</body>
</html>