In the neverending battle against blackhats, malware, insider threats and corporate espionage, we're the special forces.

Experienced incident response, system and network forensics, malware discovery/analysis and penetration testing services... Dark Particle Labs can help you win the war for your information.
Service Areas
  • Mobile Development
  • Computer and Embedded System Forensics
  • Security Software Development
  • Incident Response
  • Reverse Engineering
  • Malware Analysis
  • Penetration Testing
  • FRED
  • Quickstep Web Debugging Framework
  • Browser History Examiner
  • Windows File Tagger
Latest Articles
  • New 3D Visualization of IDA Data

  • Native debugging with the Android Emulator

    To get android native gdb debugging, do the following 1. Start your AVD 2. Shell into it "adb -s emulator-NNNN shell" 3. Make system r/w with "mount -o rw,remount -t yaffs2 /dev/block/mtdblock3 /system" 4. Rename gdbserver in /system/bin to something else 5. Get gdbserver from sysprobs

  • Something Paunch did with Graphing and IDA

    NOTE: You will probably need to refresh the screen, and use chrome - Always chrome... And, you can click and drag. A fine example of strongly connected components in action.  

  • Host Your own Spectracom Time Server

    After reading this article from the good folks at Digital Bond, I wanted to take a look at the firmware for myself.  My system setup: Ubuntu 12.04 LTS Destop in a Virtualbox VM QEMU 1.1.1 Spectracom NetClock Firmware