innovixus.tech is a Budapest-based reverse engineering practice. The work: native binaries, drivers, and untrusted code that ship inside modern desktop and mobile apps — examined, instrumented, and documented in writing. Engagements are taken one at a time.
Two practice areas. Both billed against a fixed scope of work, both delivered with a written report suitable for engineering, legal, or board review. Engagements are taken one at a time.
Triage and full reversing of suspicious native binaries — Windows PE, macOS Mach-O, Linux ELF, Android APK, iOS IPA — pulled from incidents, customer endpoints, or bundled third-party SDKs. Each engagement closes with a written account of behavior, network indicators, observed impact, and detection guidance.
Offensive review of native applications — first-party products or third-party dependencies. Source-assisted or pure black-box, across desktop and mobile. Fuzz harnesses, scaled execution, root-cause analysis, and coordinated-disclosure-ready writeups under contracted terms.
Five phases. Every artifact moves through them in order. No phase begins without sign-off on the previous one's deliverable.