1:"$Sreact.fragment" 2:I[69342,["/_next/static/chunks/dcc0aaa9e51b99ba.js","/_next/static/chunks/cc25d45eddca1107.js","/_next/static/chunks/7876da7140eec274.js"],"Navbar"] 3:I[39756,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"default"] 4:I[37457,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"default"] 5:I[22016,["/_next/static/chunks/dcc0aaa9e51b99ba.js","/_next/static/chunks/cc25d45eddca1107.js","/_next/static/chunks/7876da7140eec274.js"],""] e:I[68027,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"default"] :HL["/_next/static/chunks/362b01e11f7348a1.css","style"] :HL["/_next/static/media/0c89a48fa5027cee-s.p.4564287c.woff2","font",{"crossOrigin":"","type":"font/woff2"}] :HL["/_next/static/media/70bc3e132a0a741e-s.p.15008bfb.woff2","font",{"crossOrigin":"","type":"font/woff2"}] :HL["/_next/static/media/83afe278b6a6bb3c-s.p.3a6ba036.woff2","font",{"crossOrigin":"","type":"font/woff2"}] 0:{"P":null,"b":"SnQbk_Hk3Neu5-OQJ-O5Z","c":["","services"],"q":"","i":false,"f":[[["",{"children":["services",{"children":["__PAGE__",{}]}]},"$undefined","$undefined",true],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/362b01e11f7348a1.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","script","script-0",{"src":"/_next/static/chunks/dcc0aaa9e51b99ba.js","async":true,"nonce":"$undefined"}],["$","script","script-1",{"src":"/_next/static/chunks/cc25d45eddca1107.js","async":true,"nonce":"$undefined"}],["$","script","script-2",{"src":"/_next/static/chunks/7876da7140eec274.js","async":true,"nonce":"$undefined"}]],["$","html",null,{"lang":"en","className":"dark","children":["$","body",null,{"className":"inter_7b064e0d-module__MOT0tq__variable jetbrains_mono_84d6efd-module__5Hl15a__variable space_grotesk_4f9f433b-module__fJfFLG__variable font-sans antialiased","children":[["$","$L2",null,{}],["$","main",null,{"className":"min-h-screen","children":["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]}],["$","footer",null,{"className":"border-t border-border/50 bg-card/30","children":["$","div",null,{"className":"mx-auto max-w-7xl px-6 py-16","children":[["$","div",null,{"className":"grid grid-cols-2 gap-8 md:grid-cols-3","children":[["$","div","Company",{"children":[["$","h3",null,{"className":"mb-4 text-xs font-mono tracking-[0.15em] text-muted-foreground/60 uppercase","children":"Company"}],["$","ul",null,{"className":"space-y-2.5","children":[["$","li","About",{"children":["$","$L5",null,{"href":"/about","className":"text-sm text-muted-foreground transition-colors hover:text-foreground","children":"About"}]}],["$","li","Contact",{"children":["$","$L5",null,{"href":"/contact","className":"text-sm text-muted-foreground transition-colors hover:text-foreground","children":"Contact"}]}]]}]]}],["$","div","Resources",{"children":[["$","h3",null,{"className":"mb-4 text-xs font-mono tracking-[0.15em] text-muted-foreground/60 uppercase","children":"Resources"}],["$","ul",null,{"className":"space-y-2.5","children":[["$","li","Research",{"children":["$","$L5",null,{"href":"/research","className":"text-sm text-muted-foreground transition-colors hover:text-foreground","children":"Research"}]}],["$","li","Blog",{"children":["$","$L5",null,{"href":"https://pwn.ai/blog","className":"text-sm text-muted-foreground transition-colors hover:text-foreground","target":"_blank","rel":"noopener noreferrer","children":"Blog"}]}],["$","li","Videos",{"children":["$","$L5",null,{"href":"https://www.youtube.com/channel/UCLv3vZkQYs2Ifd_O1voc2Pg","className":"text-sm text-muted-foreground transition-colors hover:text-foreground","target":"_blank","rel":"noopener noreferrer","children":"Videos"}]}]]}]]}],["$","div","Services",{"children":[["$","h3",null,{"className":"mb-4 text-xs font-mono tracking-[0.15em] text-muted-foreground/60 uppercase","children":"Services"}],["$","ul",null,{"className":"space-y-2.5","children":[["$","li","Penetration Testing",{"children":["$","$L5",null,{"href":"/services","className":"text-sm text-muted-foreground transition-colors hover:text-foreground","children":"Penetration Testing"}]}],"$L6","$L7","$L8"]}]]}]]}],"$L9","$La"]}]}]]}]}]]}],{"children":["$Lb",{"children":["$Lc",{},null,false,false]},null,false,false]},null,false,false],"$Ld",false]],"m":"$undefined","G":["$e",[]],"S":true} f:I[69035,["/_next/static/chunks/dcc0aaa9e51b99ba.js","/_next/static/chunks/cc25d45eddca1107.js","/_next/static/chunks/7876da7140eec274.js"],"Separator"] 10:I[85437,["/_next/static/chunks/dcc0aaa9e51b99ba.js","/_next/static/chunks/cc25d45eddca1107.js","/_next/static/chunks/7876da7140eec274.js"],"Image"] 1c:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"ViewportBoundary"] 1e:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"MetadataBoundary"] 1f:"$Sreact.suspense" 6:["$","li","Red Teaming",{"children":["$","$L5",null,{"href":"/services","className":"text-sm text-muted-foreground transition-colors hover:text-foreground","children":"Red Teaming"}]}] 7:["$","li","Code Review",{"children":["$","$L5",null,{"href":"/services","className":"text-sm text-muted-foreground transition-colors hover:text-foreground","children":"Code Review"}]}] 8:["$","li","Vulnerability Research",{"children":["$","$L5",null,{"href":"/services","className":"text-sm text-muted-foreground transition-colors hover:text-foreground","children":"Vulnerability Research"}]}] 9:["$","$Lf",null,{"className":"my-12 opacity-50"}] a:["$","div",null,{"className":"flex flex-col md:flex-row items-center justify-between gap-8","children":[["$","div",null,{"className":"flex flex-col items-center md:items-start gap-3","children":[["$","$L5",null,{"href":"/","children":["$","$L10",null,{"src":"/imgs/oct.png","alt":"Octagon Networks","width":180,"height":45,"className":"h-auto w-40"}]}],["$","span",null,{"className":"text-xs text-muted-foreground/40","children":["© ",2026," Octagon Networks. All rights reserved."]}]]}],["$","div",null,{"className":"flex flex-col items-center md:items-end gap-4","children":[["$","$L10",null,{"src":"/imgs/bitcoin-accepted-here-sign-light.png","alt":"Bitcoin Accepted Here","width":160,"height":48,"className":"w-32 h-auto opacity-60"}],["$","div",null,{"className":"flex items-center gap-5","children":[["$","a",null,{"href":"mailto:contact@octagon.net","className":"text-xs text-muted-foreground/60 hover:text-foreground transition-colors","children":"contact@octagon.net"}],["$","div",null,{"className":"flex items-center gap-3","children":[["$","a",null,{"href":"https://x.com/OctagonNetworks","target":"_blank","rel":"noopener noreferrer","className":"text-muted-foreground/40 hover:text-foreground transition-colors","aria-label":"X (Twitter)","children":["$","svg",null,{"className":"w-4 h-4 fill-current","viewBox":"0 0 24 24","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"d":"M18.244 2.25h3.308l-7.227 8.26 8.502 11.24H16.17l-5.214-6.817L4.99 21.75H1.68l7.73-8.835L1.254 2.25H8.08l4.713 6.231zm-1.161 17.52h1.833L7.084 4.126H5.117z"}]}]}],["$","a",null,{"href":"https://github.com/octagon-networks","target":"_blank","rel":"noopener noreferrer","className":"text-muted-foreground/40 hover:text-foreground transition-colors","aria-label":"GitHub","children":["$","svg",null,{"className":"w-4 h-4 fill-current","viewBox":"0 0 24 24","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"d":"M12 0c-6.626 0-12 5.373-12 12 0 5.302 3.438 9.8 8.207 11.387.599.111.793-.261.793-.577v-2.234c-3.338.726-4.033-1.416-4.033-1.416-.546-1.387-1.333-1.756-1.333-1.756-1.089-.745.083-.729.083-.729 1.205.084 1.839 1.237 1.839 1.237 1.07 1.834 2.807 1.304 3.492.997.107-.775.418-1.305.762-1.604-2.665-.305-5.467-1.334-5.467-5.931 0-1.311.469-2.381 1.236-3.221-.124-.303-.535-1.524.117-3.176 0 0 1.008-.322 3.301 1.23.957-.266 1.983-.399 3.003-.404 1.02.005 2.047.138 3.006.404 2.291-1.552 3.297-1.23 3.297-1.23.653 1.653.242 2.874.118 3.176.77.84 1.235 1.911 1.235 3.221 0 4.609-2.807 5.624-5.479 5.921.43.372.823 1.102.823 2.222v3.293c0 .319.192.694.801.576 4.765-1.589 8.199-6.086 8.199-11.386 0-6.627-5.373-12-12-12z"}]}]}]]}]]}]]}]]}] b:["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}] c:["$","$1","c",{"children":[["$","div",null,{"children":[["$","section",null,{"className":"px-6 py-24 md:py-32","children":["$","div",null,{"className":"mx-auto max-w-4xl text-center","children":[["$","h1",null,{"className":"mb-6 text-4xl font-bold tracking-tight md:text-5xl","children":"Security Services"}],["$","p",null,{"className":"mx-auto max-w-2xl text-lg text-muted-foreground","children":"End-to-end offensive and defensive security services delivered by experienced researchers and engineers with a track record of discovering critical vulnerabilities."}]]}]}],["$","$Lf",null,{}],["$","section",null,{"className":"px-6 py-24","children":["$","div",null,{"className":"mx-auto max-w-7xl space-y-8","children":[["$","div","Penetration Testing",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-6 w-6 text-primary","aria-hidden":"true","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Penetration Testing"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"We simulate real-world attacks against your applications, networks, and infrastructure to identify exploitable vulnerabilities before malicious actors do."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","Web application testing (OWASP Top 10)",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Web application testing (OWASP Top 10)"}]]}],["$","li","Network & infrastructure assessments",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Network & infrastructure assessments"}]]}],["$","li","API security testing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"API security testing"}]]}],"$L11","$L12","$L13"]}]}]]}]}],"$L14","$L15","$L16","$L17","$L18"]}]}],"$L19","$L1a"]}],null,"$L1b"]}] d:["$","$1","h",{"children":[null,["$","$L1c",null,{"children":"$L1d"}],["$","div",null,{"hidden":true,"children":["$","$L1e",null,{"children":["$","$1f",null,{"name":"Next.Metadata","children":"$L20"}]}]}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}] 34:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"OutletBoundary"] 11:["$","li","Cloud configuration review (AWS, GCP, Azure)",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Cloud configuration review (AWS, GCP, Azure)"}]]}] 12:["$","li","Wireless network testing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Wireless network testing"}]]}] 13:["$","li","Detailed remediation guidance",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Detailed remediation guidance"}]]}] 14:["$","div","Red Team Operations",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-crosshair h-6 w-6 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","line","l9bcsi",{"x1":"22","x2":"18","y1":"12","y2":"12"}],["$","line","13hhkx",{"x1":"6","x2":"2","y1":"12","y2":"12"}],["$","line","10w3f3",{"x1":"12","x2":"12","y1":"6","y2":"2"}],["$","line","15g9kq",{"x1":"12","x2":"12","y1":"22","y2":"18"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Red Team Operations"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"Full-scope adversary simulation that tests your entire security program — people, processes, and technology — using the same tactics real attackers employ."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","Multi-phase attack campaigns",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Multi-phase attack campaigns"}]]}],["$","li","Social engineering & phishing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Social engineering & phishing"}]]}],["$","li","Physical security testing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Physical security testing"}]]}],["$","li","Command and control operations",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Command and control operations"}]]}],["$","li","Detection & response evaluation",{"className":"flex items-start gap-3","children":["$L21","$L22"]}],"$L23"]}]}]]}]}] 15:["$","div","Code Review",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-code-xml h-6 w-6 text-primary","aria-hidden":"true","children":[["$","path","1inbqp",{"d":"m18 16 4-4-4-4"}],["$","path","15zrgr",{"d":"m6 8-4 4 4 4"}],["$","path","e7oirm",{"d":"m14.5 4-5 16"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Code Review"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"Expert manual source code analysis combined with automated tooling to identify security vulnerabilities, logic flaws, and hardening opportunities in your codebase."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","Manual source code analysis",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Manual source code analysis"}]]}],["$","li","Automated static analysis (SAST)",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Automated static analysis (SAST)"}]]}],["$","li","Dependency & supply chain auditing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Dependency & supply chain auditing"}]]}],["$","li","Authentication & authorization review",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Authentication & authorization review"}]]}],["$","li","Cryptographic implementation review",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":["$L24","$L25","$undefined"]}],"$L26"]}],"$L27"]}]}]]}]}] 16:["$","div","Security Training",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-graduation-cap h-6 w-6 text-primary","aria-hidden":"true","children":[["$","path","j76jl0",{"d":"M21.42 10.922a1 1 0 0 0-.019-1.838L12.83 5.18a2 2 0 0 0-1.66 0L2.6 9.08a1 1 0 0 0 0 1.832l8.57 3.908a2 2 0 0 0 1.66 0z"}],["$","path","1lu8f3",{"d":"M22 10v6"}],["$","path","1r8lef",{"d":"M6 12.5V16a6 3 0 0 0 12 0v-3.5"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Security Training"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"Hands-on workshops and training programs to level up your development and operations teams on secure coding, threat modeling, and incident response."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","Secure coding workshops",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Secure coding workshops"}]]}],["$","li","Threat modeling sessions",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Threat modeling sessions"}]]}],["$","li","CTF-style training exercises",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"CTF-style training exercises"}]]}],["$","li","Incident response tabletops",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Incident response tabletops"}]]}],["$","li","Security awareness programs",{"className":"flex items-start gap-3","children":["$L28","$L29"]}],"$L2a"]}]}]]}]}] 17:["$","div","Real-time Monitoring",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-activity h-6 w-6 text-primary","aria-hidden":"true","children":[["$","path","169zse",{"d":"M22 12h-2.48a2 2 0 0 0-1.93 1.46l-2.35 8.36a.25.25 0 0 1-.48 0L9.24 2.18a.25.25 0 0 0-.48 0l-2.35 8.36A2 2 0 0 1 4.49 12H2"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Real-time Monitoring"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"Continuous security monitoring and alerting for your infrastructure, providing early warning of threats and rapid incident response support."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","24/7 threat monitoring",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"24/7 threat monitoring"}]]}],["$","li","Intrusion detection & prevention",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Intrusion detection & prevention"}]]}],["$","li","Log analysis & correlation",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Log analysis & correlation"}]]}],["$","li","Anomaly detection",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Anomaly detection"}]]}],["$","li","Incident response support",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":["$L2b","$L2c","$undefined"]}],"$L2d"]}],"$L2e"]}]}]]}]}] 18:["$","div","Vulnerability Research",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-bug h-6 w-6 text-primary","aria-hidden":"true","children":[["$","path","1qisl0",{"d":"M12 20v-9"}],["$","path","uouzyp",{"d":"M14 7a4 4 0 0 1 4 4v3a6 6 0 0 1-12 0v-3a4 4 0 0 1 4-4z"}],["$","path","qol33r",{"d":"M14.12 3.88 16 2"}],["$","path","1b0z45",{"d":"M21 21a4 4 0 0 0-3.81-4"}],["$","path","5cxbf6",{"d":"M21 5a4 4 0 0 1-3.55 3.97"}],["$","path","1jl80f",{"d":"M22 13h-4"}],["$","path","1fjd4g",{"d":"M3 21a4 4 0 0 1 3.81-4"}],["$","path","1d7oge",{"d":"M3 5a4 4 0 0 0 3.55 3.97"}],["$","path","82j7cp",{"d":"M6 13H2"}],["$","path","fmnt4t",{"d":"m8 2 1.88 1.88"}],["$","path","1vgav8",{"d":"M9 7.13V6a3 3 0 1 1 6 0v1.13"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Vulnerability Research"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"Original security research into widely-deployed software and hardware, with responsible disclosure and coordinated patching to protect the broader community."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","Zero-day vulnerability discovery",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Zero-day vulnerability discovery"}]]}],["$","li","Responsible disclosure coordination",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Responsible disclosure coordination"}]]}],["$","li","CVE publication & advisory writing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"CVE publication & advisory writing"}]]}],["$","li","Exploit development & proof-of-concept",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":["$L2f","$L30","$undefined"]}],"$L31"]}],"$L32","$L33"]}]}]]}]}] 19:["$","$Lf",null,{}] 1a:["$","section",null,{"className":"px-6 py-24","children":["$","div",null,{"className":"mx-auto max-w-3xl text-center","children":[["$","h2",null,{"className":"mb-4 text-3xl font-bold tracking-tight","children":"Need a Custom Engagement?"}],["$","p",null,{"className":"mb-8 text-muted-foreground","children":"Every organization is different. Let's discuss a tailored security assessment that fits your specific needs and threat model."}],["$","$L5",null,{"href":"/contact","children":["Get a Quote",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right h-4 w-4","aria-hidden":"true","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]],"data-slot":"button","data-variant":"default","data-size":"lg","className":"inline-flex items-center justify-center whitespace-nowrap text-sm font-medium transition-all disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg:not([class*='size-'])]:size-4 shrink-0 [&_svg]:shrink-0 outline-none focus-visible:border-ring focus-visible:ring-ring/50 focus-visible:ring-[3px] aria-invalid:ring-destructive/20 dark:aria-invalid:ring-destructive/40 aria-invalid:border-destructive bg-primary text-primary-foreground hover:bg-primary/90 h-10 rounded-md px-6 has-[>svg]:px-4 gap-2","ref":null}]]}]}] 1b:["$","$L34",null,{"children":["$","$1f",null,{"name":"Next.MetadataOutlet","children":"$@35"}]}] 21:["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}] 22:["$","span",null,{"className":"text-sm text-muted-foreground","children":"Detection & response evaluation"}] 23:["$","li","Purple team debriefs",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Purple team debriefs"}]]}] 24:["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}] 25:["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}] 26:["$","span",null,{"className":"text-sm text-muted-foreground","children":"Cryptographic implementation review"}] 27:["$","li","Secure development recommendations",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Secure development recommendations"}]]}] 28:["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}] 29:["$","span",null,{"className":"text-sm text-muted-foreground","children":"Security awareness programs"}] 2a:["$","li","Custom curriculum development",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Custom curriculum development"}]]}] 2b:["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}] 2c:["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}] 2d:["$","span",null,{"className":"text-sm text-muted-foreground","children":"Incident response support"}] 2e:["$","li","Monthly security reporting",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Monthly security reporting"}]]}] 2f:["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}] 30:["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}] 31:["$","span",null,{"className":"text-sm text-muted-foreground","children":"Exploit development & proof-of-concept"}] 32:["$","li","Vendor communication & coordination",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Vendor communication & coordination"}]]}] 33:["$","li","Public security advisories",{"className":"flex items-start gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Public security advisories"}]]}] 1d:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","2",{"name":"theme-color","content":"#030712"}]] 36:I[27201,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"IconMark"] 20:[["$","title","0",{"children":"Services | Octagon Networks"}],["$","meta","1",{"name":"description","content":"Comprehensive cybersecurity services including penetration testing, red team operations, code review, and security training."}],["$","meta","2",{"name":"keywords","content":"cybersecurity,penetration testing,red team,vulnerability research,CVE,security"}],["$","link","3",{"rel":"icon","href":"/imgs/favicon-light-32.png","media":"(prefers-color-scheme: light)","sizes":"32x32","type":"image/png"}],["$","link","4",{"rel":"icon","href":"/imgs/favicon-dark-32.png","media":"(prefers-color-scheme: dark)","sizes":"32x32","type":"image/png"}],["$","link","5",{"rel":"apple-touch-icon","href":"/imgs/apple-touch-icon.png","sizes":"180x180"}],["$","$L36","6",{}]] 35:null