We are a cyber-security company whose only purpose is to make the world a safer place.
- We perform comprehensive security testing over all of your assets.
- We use cutting edge technologies and heavily trained human hackers.
- We report vulnerabilities back to you as accurate and fast as possible.
The source code of the technologies used is versioned in this repository and is divided across many products:
Most products are distributed as a standalone binary.
Before proceeding make sure you have Nix installed in your system, otherwise please install it as explained in the tutorial.
You can install the products of your choice by using one or many of the following commands:
bash <(curl -L fluidattacks.com/install/asserts)
bash <(curl -L fluidattacks.com/install/forces)
bash <(curl -L fluidattacks.com/install/melts)
bash <(curl -L fluidattacks.com/install/reviews)
bash <(curl -L fluidattacks.com/install/skims)
bash <(curl -L fluidattacks.com/install/sorts)
you can test that they work
by invoking the product
and so on.
You can see installed software with:
nix-env -q and uninstall with: