About Us

Customers in 32+ countries are using our services

Bitekode was founded in 2009 by an offensive cyber security veteran with more then 20 years of experience, bringing new approach to the cyber security threats.

We specialise in niche fields like mobile carriers and mobile devices pentesting, IoT devices pentesting and cars pentesting.

Our security consultants, researchers and pentesters are creative, well respected in the field and contribute to our clients success, most of them are veterans IDF special cyber units. not only with their broad technical knowledge, but also with their ability to translate complex technical risk into business terms. Being a dynamic and young consultancy, the team is passionate about security and contributes to the industry with open source software, published research and security conference presentations.

Logic will get you from A to Z; imagination will get you everywhere. Albert Einstein

With more than 20 years experience in offensive cyber security, we have worked with small businesses, enterprises, governments, non-profits, academic institutions, Fortune 100/500 companies and many more.

What we do

We offer all sort of cyber security services, contact us to find out more.

Penetration Testing

Penetration testing is becoming industry standard tool for Risk and Security Assessment. We simulate environments and scenarios through Penetration testing to identify possible vulnerabilities. With different tools and practices, organizations can reduce the chances for any possible attack by a malicious user on any layer, application, hardware or network.

Security Research

We addresses the increasingly complex problems of protecting mission-critical systems and national cyber infrastructure through a broad range of advanced research, including insider threat detection, intrusion detection and reaction, computer network defense, program analysis techniques for malicious code detection, cryptography and privacy.

WiFi/Bluetooth/NFC (IoT)

Despite the security concerns many of us share regarding wireless technology, it is here to stay. In fact, not only is wireless here to stay, but it is growing in deployment and utilization with wireless LAN technology and WiFi as well as with other applications, including embedded devices and more it is essential to test the security of those products.

Mobile Devices Pentest

Mobile devices or smartphones and tablets are more increcebly becoming a profitable target for hackers due to the fact they hold vast amount of personal data on the user.

Mobile Networks Pentest

We offer pentest services for mobile carriers to test out their infrastructure and services like SS7 and SMS/MMS for vulnerabilities that can be used by malicious hackers.

Cars Pentest

Cars are likely the most complex connected devices we see. The attack surface is immense. Internet, GSM, Bluetooth, RF, DAB, USB, diagnostics,telematics and more.

Virtual “Bodyguards”

Providing encrypted channels for secret and safe communications, setting up private VPN infrastructure for private and secure browsing.

Business Intelligence

Using both OSINT capabilities and HUMINT, helping solve litigation issues, providing forensics investigation and evidence gathering.

SOC as a Service

We offer SOC as a service with 24/7, 365 days human analysts monitoring including full EDR and MDM solutions both private and cloud.

There are 3 kinds of Pentesting that we perform.

Black box - No knowledge of infrastructure. Black Box penetration testing, is carried out without the knowledge of the destination network or systems. Black Box test simulates a real attack. The attacker must collect all kinds of information about the target, strengths and weaknesses, defense systems, IP addresses, users.

Gray box - Limited knowledge of infrastructure. Gray box penetration testing is based on limited knowledge. Penetration tester may know the interactions between systems but not detailed internal software functions and operations.

White box - Collaboration with IT department. White Box penetration testing is done by the opposite method of black box testing. Penetration tester has full knowledge of network, systems and infrastructure. This information allows the penetration tester to focus on testing code and weaknesses of the systems.

Security Audit for vulnerabilities is a powerful tool for information security resource. For example, audit web site for vulnerabilities – a complex of works to identify errors in the code of the site and server software, using which attackers can attack and hack the site. As a rule, this work includes such activities as scanning the site for vulnerabilities, manual analysis of site content, search and identify errors in the logic of the script and web application components. To avoid hacking by hackers, site should be regular audits of security and to strictly follow the recommendations of experts.

Our clients

Some of our Clients.

Some Of Our Achievements

Ultricestum urna litora sit sed praesent condimentum eu a et scelerisque

350+ Clients Worked With
250+ Incidents Responded
160+ Penetrations Tests Performed
16500+ Cups Of Coffee

Have a Question?

We’re here to help you manage your cyber security needs.

Contact

Feel free to get in touch with us if you have a new project or simply something awesome

Drop us a line

Our address

Israel Office (HQ)

Derech HaAtsma'ut 9,
Haifa, Israel
Phone: +972-543761199

Cyprus Office

205, Archbishop Makarios Avenue,
Limassol, Cyprus
Phone: +357-25010510