ROT Independent Security Research Lab’s cover photo
ROT Independent Security Research Lab

ROT Independent Security Research Lab

Computer and Network Security

Offensive Security Research | AI Red Teaming | Real-World Cybersecurity Training

About us

ROT Independent Security Research Lab is a cybersecurity research and training organization focused on offensive security, AI/LLM red teaming, and real-world attack simulation. We design and build advanced offensive tools used for vulnerability discovery, exploit development, and security evaluation of modern systems. Our work focuses on complex, stateful systems where traditional testing approaches fail, including web applications, realtime systems, and AI-driven platforms. Alongside research, we conduct practical cybersecurity workshops and internship programs for students across multiple disciplines, helping them build real-world skills in offensive security and application security. Our mission is to bridge the gap between theoretical knowledge and real-world security engineering by providing hands-on, research-driven learning experiences.

Website
https://rothackers.com
Industry
Computer and Network Security
Company size
2-10 employees
Type
Self-Owned
Founded
2020
Specialties
offensive security, Cybersecurity training, web application security, AI Security, LLM Red Teaming, Vulnerability Research, Reverse Engineering, Penetration Testing, WebSocket Security, and Exploit Development

Updates

  • For the last 3 to 4 months, I have been building Rothalyx, a native reverse engineering framework focused on binary analysis, disassembly, graph recovery, decompilation, debugging, and security research. The goal was simple: build a serious reverse engineering workflow that feels integrated from the ground up instead of switching between disconnected tools for every stage of analysis. Rothalyx is built around a native core and currently includes a desktop application, binary loading, disassembly, control-flow and call graph recovery, IR and SSA-based analysis, decompiler generation, debugger integration, project persistence, scripting and plugin support, a public SDK surface, and cross-platform release packaging for Linux, macOS, and Windows. This has been one of the most demanding things I have worked on in recent months. A lot of the work was not glamorous. It involved redesigning systems, fixing packaging pipelines, validating platform behavior, tightening documentation, and learning where a feature is only “implemented” versus where it is actually usable. I am sharing it now because it has reached a stage where the overall system is real, usable, and public. If you work in reverse engineering, malware analysis, binary analysis, vulnerability research, or low-level security engineering, I would genuinely value your feedback. Links in comments #Rothalyx #ReverseEngineering #BinaryAnalysis #Decompilation #Debugger #Disassembler #MalwareAnalysis #SecurityResearch #CyberSecurity #CPlusPlus

Similar pages