Cyber
Cyber Forensics
Trace intrusions, recover artifacts, and reconstruct timelines for incidents that span endpoints, networks, and the cloud.
MAF Labs investigates incidents most teams stop short of: VLSI tamper, IoT firmware, cyber intrusions across enterprise stacks. We also run a hands-on internship for the next generation of forensics engineers.
Recent extractions
Chain-of-custody first. Every extraction logged, hashed, and reproducible — for proceedings or post-incident audit.
From silicon to cloud. We pull artifacts off devices and out of stacks most teams treat as black boxes.
An internship that puts students on real cases under mentor supervision — not slide decks.
What we do
Cyber
Trace intrusions, recover artifacts, and reconstruct timelines for incidents that span endpoints, networks, and the cloud.
VLSI
Hardware-level investigation across silicon, firmware, and side-channel surfaces — the layer most forensic teams stop short of.
IoT
Pull evidence off the devices most teams treat as black boxes — sensors, gateways, embedded controllers, and the protocols they speak.
Why MAF Labs
Disk + memory + storage imaging with hash verification at every stage. No assumptions about what was there.
Cyber, VLSI, and IoT under one roof. We diff firmware as comfortably as we trace lateral movement.
Executive summary your board can absorb. Technical appendix that holds up under cross-examination.
Engagements run under NDA. Findings travel through encrypted channels. Manifests redacted on request.
Every operator action audit-logged. Append-only chain-of-custody records survive even our own platform.
Internship cohorts work on real (anonymized) artifacts. Graduates ship with portfolio-grade deliverables.
How it works
Send the surface, the situation, and any constraints. One-business-day reply with a scoping outline — no slide deck.
Engagement letter, chain-of-custody plan, artifact acquisition. You see the manifest before any extraction touches your environment.
Written report with hashes, timeline, and a technical-and-executive summary. We stand by it in proceedings if it comes to that.
Eight weeks on real (anonymized) forensics cases — VLSI, IoT, cyber — paired 1:1 with a senior investigator. Portfolio-grade deliverables. Chain-of-custody from the first hash. No slide decks.