Cybersecurity · Cryptography · AI security

Offensive and defensive security,
from cryptography to AI systems.

For over 20 years we've helped multinationals, governments and startups secure what matters. Technical audits, original research and specialised training, delivered by practitioners.

20+
Years of experience
1,400+
Professionals trained
10,000+
Hours of training
8
Books published
Services

What we do

Four areas of practice, built on two decades of hands-on work with real adversaries and real systems.

01 — AI security

AI security services

End-to-end security for AI systems. LLM risk assessment, prompt-injection testing, model-abuse analysis and secure AI architecture design. We protect pipelines, data and models against misuse, leakage and adversarial attacks while keeping you aligned with emerging AI regulations.

02 — Audits

Technical audits

For more than two decades multinationals, governments, startups and individuals have trusted us to assess the security of their infrastructures — networks, Wi-Fi, cloud — and software, including deep audits of cryptographic solutions and information-protection mechanisms.

03 — Research

Offensive & defensive research

Original research leading to proprietary, disruptive offensive and defensive techniques. Our work has been presented at Black Hat, Virus Bulletin, Hack In The Box, Ekoparty, RootedCON and other leading security conferences worldwide.

04 — Training

Specialised training

More than 1,400 professionals trained across 10,000+ hours of instruction, in person and online. Programmes range from foundational upskilling to advanced, hands-on workshops with real-world scenarios, tailored to the needs of each team.

Research presented at
Black Hat Virus Bulletin Hack In The Box Ekoparty RootedCON
Books

Published works

Eight books on cryptography, steganography, SSL, machine-learning security, threat intelligence and secure software development.

Community

Free knowledge, two decades on

Criptored believes in free and accessible knowledge. Millions of documents and hundreds of hours of training openly shared over the last 20 years. Awards & recognition →

Conferences

Events we organise

Two ongoing formats bringing together researchers, practitioners and students.

Alfonso Muñoz
About

Led by Alfonso Muñoz

More than 20 years working with multinational companies, governments and startups in technical audits, offensive and defensive research, and specialised training.

Published author, international speaker and researcher in cryptography, steganography and AI security.

FocusCryptography · AI security
Based inSpain · Remote worldwide
LanguagesEnglish · Spanish
Contact

Work with us

Tell us about your project. We respond within two business days.

Whether you need a one-off audit, an AI security review, or a multi-year training programme for your team, start by telling us what you're trying to achieve.

PGP public key 0x1C1DFE12 · for encrypted communications

Encrypt sensitive messages with this key before sending. The same key is used for the Proton Mail address above.

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=JdhQ
-----END PGP PUBLIC KEY BLOCK-----
We respond within two business days.