True Security For

MNOs & MVNOs
Blockchain
WebApps
SaaS
Telecom
Automotive
Intelligence
Telecom
Military
Goverment
Defense
Private Sector
Blockchain
Fintech
SaaS
Blockchain
Designers
Goverment
Telecom
Fintech
SaaS
Defense
Military
Automotive
International Security

Company

+ 7

COMPANY'S SECURED

Private R&D

Company

+ 12

PROJECTS DELIVERED

Global Threatscape

Research

+ 21%

INCREASE PER YEAR

Result Oriented Security


With over 15 years of Research in the intelligence domain we bring real solutions to the table by people who have created some of the most capable offensive & defensive tools in the Intelligence and Defense sectors.

PenTest Success Rate

Company

+ 93%

FATAL FLAWS EXPLOITED

Telecom Penetration

Countries

+ 150

BYPASSED SECURITY

Code Security Audits

Company

+ 97%

FATAL FLAWS UNCOVERED

Telecom Framework

Unleash The Full Power
Of Our Framework

A unique advantage of Raykore is our in house developed protocol stack that allows us to go beyond specifications in security testing and complete flexibility over all OSI layers above and below the transit IP protocols

Big Data
Telecom
GMLC+

MAP & Diameter for full 2G / 3G / 4G / 5G Radio Technology support

GLR+

Fully programmable node that can act as HLR / HSS & SMS Home Router all in one

SMSC+

Features rich SMSC with in depth protection mechanisms against Simjacker / OTA / Binary SMS attacks & Simbox fraud

Signaling Firewall +

High performance signaling firewall with programmable elastic monitoring and honeypot capabilities for MAP / CAMEL & Diameter. The HTTP APIs are provided in XML and JSON formats, and support all layer from SS7 SCCP and any Diameter AVP

STP & DSC+

STP & DSC+ a three in one solution capable of acting as a Sigtran STP & Diameter DRA / DEA all in one single solution, with direct integration capabilities over multiple protocols with our  transaction monitoring Firewall

Sigtran  Injector +

Modular fuzzer, builder  that goes beyond specifications, responsible for our 0 day vulnerability finds. Build to manipulate any part of the message construction, capable of stitching together MAP / Camel / TCAP / MTP / SCCP elements in any way we see fit

Diameter  Injector +

Modular fuzzer, builder  that goes beyond 3GPP specifications, responsible for our 0 day vulnerability finds. Build to manipulate any part of the message construction, allowing us to stitch together and fuzz various AVP elements in any way we see fit

VoLTE / VoWiFI Injector

Reverse engineered VoLTE/WiFI fuzzer and injector capable of taking over consumer devices and utilizing them as an injection entry points to telecom IMS and relevant nodes. Proficient at fuzzing various call flaws and exposing vulnerabilities within network elements infrastructures

Services

Unleash the full power
Of Your Products

Be Confident, Be Secure in your products and execution

check_circle
Black Box Testing threat detection with zero network insights
check_circle
Grey Box Testing defect detection utilizing structure knowledge
check_circle
White Box Testing issue detection via in depth visibility
Auditing
Pen Testing
rocket
SS7  Exploit  Assessment

Extended CS/PS Core Network Vulnerability Assessment of Core Networks through International Roaming perspective. Evaluation of every GSMA FASG FS.11 category, in compliance with FS.11. Category 1, 2 & 3 SS7 signaling MAP messages.

  • check_circle
    Subscriber Information Leak
  • check_circle
    Network / Subscriber DoS
    check_circle
    Routing Abuse / GT Abuse
    check_circle
    Subscriber / SMS Spoofing
    check_circle
    SMS / Voice Interception
    check_circle
    USSD exploitation
    check_circle
    SMS Spam & Fraud
  • check_circle
    Subscriber Location Leak

Potential Week Elements

Black Box Breach Assessment

Acquisition of a Global Title that is whitelisted in the operators network without establishing roaming agreement.

Grey Box Breach Assessment

Operator provides IPSEC trunk with testing Global Title either through their signaling provider on directly on front facing Signaling Point to emulate INAT traffic.

pan_tool_alt
Diameter Exploit  Assessment

Active Diameter signaling scanning of an Operator’s EPC Network from International Roaming perspective. This vulnerability assessment will evaluate FS.19 GSMA Category 0, 1, 2, 3 Diameter signaling messages.

  1. check_circle
    DRA/DEA Bypass
    check_circle
    Subscriber Spoofing
    check_circle
    Subscriber Location Leak
    check_circle
    Network / Subscriber DoS
    check_circle
    Realm Abuse
    check_circle
    Network Discovery
    check_circle
    Data Interception

Potential Week Elements

Black Box Breach Assessment

Acquisition of a Realm that is whitelisted in the operators network without establishing
roaming agreement.

Grey Box Breach Assessment

Operator provides IPSEC trunk with whitelisted Realm either through their signaling provider on directly on front facing Signaling Point to emulate INAT traffic.

electric_bolt
IMS VoLTE /VoWiFi Exploit Assessment

Active IMS signaling scanning of an Operator’s IMS VoLTE Access. This Vulnerability Assessment will cover FS.22 VoLTE Security Analysis and Recommendations” GSMA FASG document cases for VoLTE.

  • check_circle
    Network Discovery
  • check_circle
    Leakage via Injection
    check_circle
    Subscriber Location Leak
    check_circle
    Fraud & Spam
    check_circle
    Subscriber Information Leak
    check_circle
    SMS/ Voice Spoofing
    check_circle
    Lawfull Interception Bypass
    check_circle
    Fraud & Spam
    check_circle
    Subscriber & Network DoS
    check_circle
    Database Query Injection
    check_circle
    Database Query Injection
  • check_circle
    Billing Bypass

Potential Week Elements

Black Box Breach Assessment

Acquisition of a VoLTE / VoWiFI capable simcard without operator intervantion

Grey Box Breach Assessment

Acquisition of a VoLTE / VoWiFI capable simcard and remote accessible device via the assistance of the operator

category
2G /3G /4G /5G Radio Access Network Vulnerability Assessment

In Depth testing of radio access Base stations and controllers

  • check_circle
    Subscriber Information Leak & billing bypass
  • check_circle
    Radio configurations
    check_circle
    Subscriber Spoofing
  • check_circle
    Injection of S1AP, SIGTRAN messages
keyboard_command_key
WebApp & RestAPI Vulnerability Assesment

Exploitation and identification of week points in web applications for the identification of various vulnerabilities

  • check_circle
    IDOR Exploitation
  • check_circle
    Access Control Failures
    check_circle
    Code Injection Variations
    check_circle
    Insecure Design Flaws
  • check_circle
    and many more
vpn_key
Hardware & Firmware Vulnerability Assesment

In depth testing of hardware devices utilized in various industries space

  • check_circle
    Automotive Industry & IOT
  • check_circle
    Defense & Space
    check_circle
    Finance & Blockchain
    check_circle
    Automotive Industry & IOT
  • check_circle
    and many more
category
IOS / Android App Reverse Engineering & Vulnerability Assessment

Disassembly, analysis and injection testing of applications for identification of potential vulnerabilities and week points of integrated APIs

sort
Network Security

In depth exploitation assessment for entry point and exploit identification for data farms, data centers, IOT network and more.

  • check_circle
    Dedicated Red Team
  • check_circle
    Dedicated Purple Team
  • check_circle
    Dedicated Blue Team
Consulting

Unleash the full power
Of Your Ideas

Be Innovative, Be The Trailblazer in your market

rocket
Research & Development

Innovate and introduce new products and service into your existing offerings, we have conducted an extensive amount of research for various industries focusing in the Defense / Space & Intelligence Sectors. We will undertake the complete cycle of R&D for your idea and delivery the finalized product.

Industry Expertise

  • check_circle
    Wireless Hardware
  • check_circle
    AI / ML & NLP systems
    check_circle
    Large Distributed Systems
    check_circle
    Defensive & Offensive Tools
    check_circle
    Intelligence Tools
    check_circle
    Hardware Design & QA
  • check_circle
    Big Data Systems
vpn_key
Security Training Workshops

We offer in depth training seminars and workshops for intelligence domain subjects, with the capacity to conduct them either in your establishments or through virtual mediums

Telecom Training Subjects

  • check_circle
    TS-101 Telecom Security
  • check_circle
    TS-102 IMS Security
    check_circle
    TS-104 2G/3G Insecurities
    check_circle
    TS-105 4G/5G Insecurities
  • check_circle
    TS-103 Attacking Telecom

OSINT Training Subjects

  • check_circle
    OS-101 Methodologies
  • check_circle
    OS-102 Techniques

Other Trainnings On Demand!

pan_tool_alt
Development Consulting

We help you design custom technology solutions tailored to your business needs. This can be customizing an existing application, assisting with IT outsourcing services, or creating a dedicated team of software consultants to achieve your business goals.

Software development, project management, IT services, software modernization  whatever your organization needs, we will help you meet your business requirements. Our expertise spans an area of niches, topics, and sectors.

Turn your Projects Into A Reality

Contact Us

Questions?

We are excited to help you, our team will contact you as soon as possible or feel free to contact us directly on sales@raykore.com