networks ◦ forensics ◦ research ◦ consulting & training


We excel at...


If you teach, design and develop networks for several years, you master a lot of protocols and technologies. However, we are not a bunch of academics disconnected from the reality! We can solve real-life problems of our customers by having an objective view and applying reasonable thinking. We are ready for your mission-specific networking troubles.


Have you ever wonder how to find a needle in a haystack? We do! That is the reason why we focus on networking forensics. If you want to find meaningful information in terabytes of captured data or if you are struggling with your cryptocurrency related investigation, we can help you. We gathered a lot of experience from our cooperation with government institutions.


We have a strong academic background! Our products originated from our cooperation with research institutions. We were participating in various research grants and projects focused on cybersecurity and privacy. We support a collaboration, thus, we try to publish our results at global conferences.


We love to share our knowledge and know-how with others! Furthermore, teaching is our daily bread at the university. We customize training according to the specific needs and request of our clients. We are proud of our certification portfolio (including industry-recognized exams by Cisco, Microsoft, Red Hat, Juniper, Google).


We are publishing slides and materials from our public appearences via blog posts.


We established limited liability company netsearch s.r.o. in order to commercialize our know-how and products.
Uploaded image


He is a great lecturer with natural gift to explain even complicated problems easily. He is also a skilled developer enthusiastic to new networking protocols and architectures.
Uploaded image


The main developer of the NetFox Detective, skilled coder, teacher and Windows expert. He maintains all .NET documentation in his memory.
Uploaded image


Grumbler who does not believe in a technology if he cannot try it. The only guy in the team who runs Linux and even compiles an own kernel. Sigh…
Uploaded image

Vojtěch Večeřa

Perspective developer who always seeks for new ideas and approaches. He doesn’t leissure under pressure nor he rests in bug nests. His interests are in network and distributed systems.
Uploaded image


Computing technology tinkerer who insists on finding the right tool for the job at hand no matter how obscure that tool might be.
Uploaded image

Vladimír Jeřábek

A guy interested in IT security who likes to explore new technologies, such as a blockchain or neural networks. A big fan of open source projects and a loyal Linux user. He focuses on how program works rather than how it looks.
Uploaded image

Marcel Marek

Uploaded image

Jan Zavřel

Uploaded image

Viliam Letavay

Software engineer and researcher who likes to make smart things dumb and dumb things smart.
Uploaded image

Daniel Dolejška

Uploaded image

Michal Koutenský

Uploaded image

Denis Hromada

Uploaded image

František Fiala


COINØMON is mission-specific platform offering forensics over various blockchains of several cryptocurrencies. COINØMON can help you correlate real-life events with blockchain data - e.g., reveal the identity of cryptocurrency address owner, determine gains and losses of ransomware attack, collect and produce acceptable court evidence. COINØMON enhances working processes in your organization and easily shares data with other applications.
TANSY is password recovery machine leveraging general-purpose computing on GPUs. TANSY has a form of dedicated server beating its competitors in reliability. Hardware maximizes stability by employing reliable components hosted in custom-designed box delivering a great air-flow. TANSY offers the best ratio between investment and received cracking performance – let economies of scale work for you, buy more GPUs (and increase your hashrate) for the same money.
With proprietary software/open-source tools, you often fight limits for scaling up distribution task. ENNERACT offers hypervisor distributing the computation over your infrastructure, which is capable of recovering from failures automatically or assigning work based on different strategies. ENNERACT correctly extracts hashes even from tricky formats such as 7z or RAR. ENNERACT supports various approaches to generate password including brute-force, dictionaries, rule-sets or Markov chains.
Pa$$v0rt0 tool consolidates leaks of credentials from various sources (including social networks, cryptocurrency exchanges, online games, city names). Our databases contain multi-terabytes of data with billions of usernames and hundreds of millions of passwords. This information can accelerate your password recovering operation or help you assess the security habits of the person.
ORWELL is distributed evidence collection framework capable of advanced, parametrized web crawling and archiving. With ORWELL, you can collect online evidence of illicit activities gathered from various sources (e.g., surface web, deep web, dark web). ORWELL infrastructure offers gateways to Tor/I2P/Freenet, overcomes rate-limiting or bypasses captchas/authentication vectors.