As a series of hacking violence rampages through every house, school, business and government, damage to all circumstances leads to thousands of billions economic losses and collapses.

For ages, antivirus software is key to preventing the above mentioned; however, it is apparently insufficient after all. Instead of passively relying on a ready-made or all-purpose antivirus software, possessing a custom-built one broadens your horizons of information security and technology.

We provide a diversity of the most optimal portfolio of solutions to your budget preference and for your selection.

Defend as the majority of companies may, in the aspects of hackers we consider it to the contrary; say, "THE BEST DEFENSE IS OFFENSE."

We are your trustworthiest ally going by name... ZUSO Generation that is always on the same page with you and turns over a new leaf of "happily-ever-after" for you!

In the aspects of hackers, we attempt to invade a corporate's website and information system, from exterior to interior, in purpose of doxing the possibility of potential threats for issuance of complete report and advice of improvement.
Reward Pentesting
Distinctive from a precedent PT model, bug bounty type PT conducts in a corporate's best interests and provides the most budget-wise alternatives.
Data Science
“A sure way to victory is to know both your strength and the enemy's. " We exploit an unique technique for analyses, spot your most desirable outcome and render you the most concrete recommendation.
Consultation Service
The thinking pattern of a singular aspect is out in terms of information security and data analyses. Multiple perspectives ace! With sincerity, we provide you the panorama of circumnavigation-wide visions and assist your corporate in advancing to better prosperity.


We are a team of information security enthusiasts with a number of years' experiences in the related domains. This equips us, "hotshot hackers", with skillful capabilities in agility of coping mechanism and in profession of cyber-security knowledge. With such abundance in hands-on techniques, we provide a variety of the most effective and the toughest defenses in the perspective of OFFENSE.

ik hung
Bf Chen


A multitude of hotshot hackers we are, coming into existence in the center of Taiwan for information security and further, we endeavor to envision the world.

Everything is possible! Any mode of partnership will do! We respond to all possibility of collaboration. More specifically, we, in other words, anticipate all sorts of cooperations, whatever form it may be ----- even a "crossover" alliance.