{"id":64,"date":"2025-01-03T14:51:43","date_gmt":"2025-01-03T14:51:43","guid":{"rendered":"http:\/\/galvanizedsecurity.com\/?page_id=64"},"modified":"2025-01-03T16:47:59","modified_gmt":"2025-01-03T16:47:59","slug":"home","status":"publish","type":"page","link":"https:\/\/galvanizedsecurity.com\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"64\" class=\"elementor elementor-64\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75986070 e-flex e-con-boxed e-con e-parent\" data-id=\"75986070\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-63153654 e-con-full e-flex e-con e-child\" data-id=\"63153654\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1871becd elementor-widget elementor-widget-heading\" data-id=\"1871becd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Tailored cybersecurity solutions<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-326d53de elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"326d53de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Galvanized Security specializes in vulnerability research and reverse engineering on the most challenging targets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-189e6f09 e-con-full e-flex e-con e-child\" data-id=\"189e6f09\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_opacity_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_opacity_level&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;7&quot;,&quot;sizes&quot;:[]},&quot;background_motion_fx_opacity_range&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:&quot;0&quot;,&quot;end&quot;:&quot;100&quot;}},&quot;background_motion_fx_opacity_direction&quot;:&quot;out-in&quot;,&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46c8e4c9 e-flex e-con-boxed e-con e-parent\" data-id=\"46c8e4c9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1cad9abc e-con-full e-flex e-con e-child\" data-id=\"1cad9abc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-358de774 elementor-widget elementor-widget-heading\" data-id=\"358de774\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vulnerability Research<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b243121 elementor-widget elementor-widget-text-editor\" data-id=\"6b243121\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At the heart of Galvanized Security we focus on vulnerability research through source code analysis and reverse engineering.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c47e56f e-con-full e-flex e-con e-child\" data-id=\"3c47e56f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7169d054 elementor-widget elementor-widget-heading\" data-id=\"7169d054\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Custom Tooling<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77114194 elementor-widget elementor-widget-text-editor\" data-id=\"77114194\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Complex problems often require custom tooling. We can provide tailored solutions and support for complex vulnerability research projects.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c29658 e-con-full e-flex e-con e-child\" data-id=\"2c29658\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b675422 elementor-widget elementor-widget-heading\" data-id=\"b675422\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-473fd0f elementor-widget elementor-widget-text-editor\" data-id=\"473fd0f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We are passionate about galvanizing the next generation of hackers through tailored courses tackling hard topics from first principles.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Tailored cybersecurity solutions Galvanized Security specializes in vulnerability research and reverse engineering on the most challenging targets. Vulnerability Research At the heart of Galvanized Security we focus on vulnerability research through source code analysis and reverse engineering. Custom Tooling Complex problems often require custom tooling. We can provide tailored solutions and support for complex vulnerability [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-64","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Home - Galvanized Security<\/title>\n<meta name=\"description\" content=\"Tailored cybersecurity solutions Galvanized Security specializes in vulnerability research and reverse engineering on the most challenging targets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/galvanizedsecurity.com\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home - Galvanized Security\" \/>\n<meta property=\"og:description\" content=\"Tailored cybersecurity solutions Galvanized Security specializes in vulnerability research and reverse engineering on the most challenging targets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/galvanizedsecurity.com\/\" \/>\n<meta property=\"og:site_name\" content=\"Galvanized Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-03T16:47:59+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/galvanizedsecurity.com\/\",\"url\":\"https:\/\/galvanizedsecurity.com\/\",\"name\":\"Home - Galvanized Security\",\"isPartOf\":{\"@id\":\"https:\/\/galvanizedsecurity.com\/#website\"},\"datePublished\":\"2025-01-03T14:51:43+00:00\",\"dateModified\":\"2025-01-03T16:47:59+00:00\",\"description\":\"Tailored cybersecurity solutions Galvanized Security specializes in vulnerability research and reverse engineering on the most challenging targets.\",\"breadcrumb\":{\"@id\":\"https:\/\/galvanizedsecurity.com\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/galvanizedsecurity.com\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/galvanizedsecurity.com\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/galvanizedsecurity.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/galvanizedsecurity.com\/#website\",\"url\":\"https:\/\/galvanizedsecurity.com\/\",\"name\":\"Galvanized Security\",\"description\":\"Galvanized Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/galvanizedsecurity.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Home - Galvanized Security","description":"Tailored cybersecurity solutions Galvanized Security specializes in vulnerability research and reverse engineering on the most challenging targets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/galvanizedsecurity.com\/","og_locale":"en_US","og_type":"article","og_title":"Home - Galvanized Security","og_description":"Tailored cybersecurity solutions Galvanized Security specializes in vulnerability research and reverse engineering on the most challenging targets.","og_url":"https:\/\/galvanizedsecurity.com\/","og_site_name":"Galvanized Security","article_modified_time":"2025-01-03T16:47:59+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/galvanizedsecurity.com\/","url":"https:\/\/galvanizedsecurity.com\/","name":"Home - Galvanized Security","isPartOf":{"@id":"https:\/\/galvanizedsecurity.com\/#website"},"datePublished":"2025-01-03T14:51:43+00:00","dateModified":"2025-01-03T16:47:59+00:00","description":"Tailored cybersecurity solutions Galvanized Security specializes in vulnerability research and reverse engineering on the most challenging targets.","breadcrumb":{"@id":"https:\/\/galvanizedsecurity.com\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/galvanizedsecurity.com\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/galvanizedsecurity.com\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/galvanizedsecurity.com\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/galvanizedsecurity.com\/#website","url":"https:\/\/galvanizedsecurity.com\/","name":"Galvanized Security","description":"Galvanized Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/galvanizedsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/galvanizedsecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/64","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/galvanizedsecurity.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/galvanizedsecurity.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/galvanizedsecurity.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/galvanizedsecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=64"}],"version-history":[{"count":52,"href":"https:\/\/galvanizedsecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/64\/revisions"}],"predecessor-version":[{"id":180,"href":"https:\/\/galvanizedsecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/64\/revisions\/180"}],"wp:attachment":[{"href":"https:\/\/galvanizedsecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}