EST · MMXXV · CCLVII
WINDHOEK · NA
[01 · SCISSALC]
BUILT TO OUTLAST →
— SCISSALC TECHNOLOGIES —
⊃CISSAL⊂
memento codex
BUILT · TO · OUTLAST
SCROLL
— PHILOSOPHY · 02 —
02 / 07

The Discipline

An inversion. A discipline. A name that means something to those who find it. SCISSALC started as an idea between friends who believed the old disciplines still matter. Stoic patience. Architectural thinking. The long view. None of that has gone out of style, regardless of what framework is trending this quarter.

We are a small team. We are deliberate. We don't announce our methods. We've been building since before we had a proper name for it, and we'll keep building long after the current noise cycle passes.

The number 257 appears in our work the way a mason's mark appears in cathedral stone. Not for the crowd. For those who look closely. Every system we ship carries the same commitment: architecture, restraint, intent, and the belief that the work should outlast the people who made it.

Four things we won't compromise on: design before code, simple tools over custom complexity, working software over promises, and documentation that survives the team that wrote it.
[ 257 ]
FIG · I — OBELISK
02·5 / 07

The four pillars

I

Architecture before code

We design the system before we touch a keyboard. Data models, deployment topology, edge-case planning, all of it on paper first. It costs a week upfront and saves months later. Most problems in software aren't coding problems. They're thinking problems that got coded before anyone thought properly.

II

Lean stack, sharp tools

Next.js. Supabase. Vercel. Stripe. Cloudflare. We picked these once and we don't reinvent them. The boring parts of a project should be boring. Our energy goes into what's actually new about your problem, not rebuilding infrastructure that already exists and works.

III

Ship, then refine

Working software in the hands of real users beats a perfect roadmap sitting in Notion. We get something live fast, watch how people actually use it, and improve from there. The spec always changes once real users touch the thing. Better to find out early.

SOFTWARE CYBERSECURITY SAAS — MEMENTO CODEX — BLOCKCHAIN AI INTEGRATION BRAND SYSTEMS CCLVII WINDHOEK BUILT TO OUTLAST PEN TESTING INFRASTRUCTURE — 257 — SOFTWARE CYBERSECURITY SAAS — MEMENTO CODEX — BLOCKCHAIN AI INTEGRATION BRAND SYSTEMS CCLVII WINDHOEK BUILT TO OUTLAST PEN TESTING INFRASTRUCTURE — 257 —
— SERVICES · 03 —
03 / 07

What we build

01
Software Development
Web platforms, mobile apps, APIs, internal tools. Lean, fast-ship, built to scale. We build the thing, document the thing, and hand you the keys.
WEB · MOBILE · API · SAAS
Web Platforms
Next.js, React, Vue. Server-rendered, edge-deployed, fully typed.
Mobile Apps
React Native and native iOS/Android for performance-critical builds.
APIs & Backends
REST, GraphQL, tRPC. Postgres, Supabase, Redis, queues.
Internal Tools
Admin panels, dashboards, ops tools. Retool, custom, your call.
Integrations
Stripe, Twilio, payment gateways, third-party APIs, webhook orchestration.
MVP Sprints
Two-to-six week MVPs to validate before you scale or sell.
02
Cybersecurity & Ethical Hacking
We think like the adversary. Penetration testing, red team operations, OSINT reconnaissance, AI-assisted threat intelligence, dark web surveillance — executed with methodical precision before the wrong people get there first.
PEN-TEST · RED TEAM · OSINT · DARK WEB
Penetration Testing
Full-scope ethical hacking — web apps, APIs, mobile, internal networks, social engineering. Black box, gray box, white box. We attempt the breach so an attacker can't.
Red Team Operations
Simulated advanced persistent threat campaigns. Multi-vector, multi-phase attacks to test your detection and response under real adversarial conditions.
OSINT & Reconnaissance
We map your public attack surface the way a threat actor would — certificate transparency logs, leaked credentials, search engine dorking, passive recon.
Dark Web Monitoring
Continuous surveillance of dark web markets, Telegram channels, and paste sites for your credentials, source code, customer data, or brand mentions.
AI-Assisted Threat Intel
LLM-powered correlation across raw threat feeds, internal logs, and dark web chatter — surfacing the signals that matter before analysts would find them.
Incident Response
When the breach has already happened: forensics, containment, eradication, recovery, and a post-incident report that prevents the next one.
03
IT Infrastructure
Network design, cloud deployment, systems administration, hardware procurement. End-to-end infrastructure for businesses that want to stop thinking about IT.
CLOUD · NETWORK · PROCUREMENT
Cloud Architecture
AWS, Azure, GCP. Multi-region, cost-optimized, IaC with Terraform.
Network Design
Office and enterprise network deployment, Cisco, Mikrotik, Ubiquiti.
Server Administration
Linux, Windows Server, hypervisors, automated provisioning.
Hardware Procurement
Sourcing, configuration, deployment of workstations, servers, peripherals.
Identity & Access
SSO, MFA, role-based access, directory services, zero-trust.
Backup & Continuity
Disaster recovery planning, off-site backups, runbook documentation.
04
AI & Custom Engineering
Bespoke engineering for unusual problems. AI integration, automation, blockchain systems, internal tooling. If it hasn't been built yet, we're probably interested.
AI · BLOCKCHAIN · AUTOMATION
AI Integration
LLM-powered features, RAG, agents, fine-tuning, vector databases.
Workflow Automation
n8n, Zapier, custom scripts. Replace recurring human work with reliable code.
Blockchain Systems
Wallets, smart contracts, multi-chain integrations, custodial flows.
Data Engineering
ETL pipelines, warehouses, analytics infrastructure, real-time streams.
Computer Vision
Object detection, OCR, document parsing, image classification at the edge.
R&D Sprints
Time-boxed prototypes for "is this even possible?" questions.
05
Branding & Visual Identity
Logo systems, visual identity, brand guidelines, design direction. Built like ours — with discipline, restraint, and a long shelf life.
LOGO · SYSTEM · DIRECTION
Logo & Marks
Wordmarks, monograms, sigils. Full systems with usage rules.
Brand Guidelines
Color, type, voice, tone, photography. Documentation that scales the brand.
Naming & Verbal
Names, taglines, manifestos. The words the brand lives by.
Design Systems
Component libraries, tokens, Figma kits engineered for shipping teams.
Print Collateral
Business cards, letterheads, decks, posters. The tactile side of brand.
Brand Strategy
Positioning, messaging architecture, competitive context.
06
Graphic & Motion Design
Editorial layouts, marketing visuals, motion graphics, social content systems. The visual output that fills the brand once it's defined.
EDITORIAL · MOTION · SOCIAL
Editorial & Print
Magazines, reports, books, lookbooks. InDesign-grade typography.
Marketing Visuals
Ad creative, landing graphics, social posts, email templates.
Motion Graphics
Animated logos, explainers, loops, social-first short-form motion.
3D & Product Viz
Product renders, packaging mockups, scene composition. Blender, C4D.
Illustration
Custom illustration systems, icon sets, editorial spot art.
Photography Direction
Brand shoot planning, art direction, post-production.
07
Architecture & Engineering
CAD documentation, architectural visualization, engineering drawings. The IT side of the building disciplines — digital twins, BIM workflows, technical drawing.
CAD · BIM · VISUALIZATION
CAD Drafting
AutoCAD, Revit, SketchUp. Plans, sections, elevations, working drawings.
3D Visualization
Photorealistic renders, walkthroughs, exterior and interior viz.
BIM Coordination
Building Information Modeling for multi-discipline coordination.
Engineering Drawings
Mechanical, electrical, fabrication drawings to spec.
Digital Twins
Live 3D models tied to sensors and operations data.
VR Walkthroughs
Immersive client presentations of unbuilt space.
08
Marketing & Growth
Social media strategy, content systems, paid acquisition, SEO. Marketing engineering — measurable, compounding, built to run with or without us.
STRATEGY · CONTENT · GROWTH
Social Strategy
Channel mix, content cadence, community management playbooks.
Content Systems
Editorial calendars, content engines, repurposing pipelines.
Paid Acquisition
Meta, Google, TikTok ad management with creative testing rigor.
SEO & Technical
Site architecture, schema, link building, content optimization.
Email & CRM
Lifecycle flows, automation, segmentation, deliverability.
Analytics
GA4, attribution, dashboards, conversion analysis.
09
Strategy & Consulting
Technology strategy, digital transformation, technical due diligence. Honest advice from people who've shipped the thing you're about to build.
STRATEGY · TRANSFORMATION · DD
Tech Strategy
Roadmaps, build-vs-buy decisions, technology selection.
Digital Transformation
Legacy modernization, process digitization, change management.
Technical Due Diligence
Codebase audits, team assessments, scalability and risk reviews for investors.
Fractional CTO
Part-time technical leadership for startups not yet ready to hire one.
Workshops & Training
Team training on cybersecurity, AI literacy, secure development.
Procurement Advisory
Vendor selection, RFP support, contract review for tech purchases.
04 / 07

Our Products

"Talk is cheap. The apps are where the work actually shows."
CYBERSECURITY · ENTERPRISE

ShieldWatch

Dark web monitoring, threat intelligence, and continuous security posture for companies that can't afford to find out from the news.
SAAS · SUBSCRIPTION LEARN →
FINTECH · NFC · NAMIBIA

NamPay

A digital wallet with NFC tap-to-pay — closing the gap that Namibian banks still haven't. Phone as contactless card, no physical card needed, no bank approval required.
APP · MOBILE-FIRST LEARN →
SOCIAL BETTING · CRYPTO

DropBet

AI-powered peer-to-peer betting on anything. Multi-currency crypto wallets, escrow locking, evidence-based resolution, real-time feeds.
APP · MOBILE-FIRST LEARN →
— Why we build —

The product is the proof.

Every app in the SCISSALC portfolio is asking the same question: does the philosophy hold up when real users start poking at it?

We don't build software to fill a roadmap. We build to find out if lean stacks actually beat complex monoliths in practice, if disciplined design actually outperforms feature bloat, if infrastructure can actually stay invisible. Each product is a small, live test of those beliefs.

Some are SaaS. Some are tools. Some are still figuring out what they are. All of them are built to still be running in ten years.

— THE FULL PORTFOLIO · 08 APPS —
In production · in beta · in development
— click any card to read more
IN BUILD
APP · 01
ShieldWatch
CYBERSECURITY
AI-powered dark web monitoring and threat intelligence for enterprise security teams.
Next.jsPostgresOSINT
BETA
APP · 02
DropBet
SOCIAL · CRYPTO
AI-powered peer-to-peer betting on anything. Crypto escrow, evidence resolution, real-time feeds.
Next.jsSupabaseAnthropic
DEV
APP · 03
NamPay
FINTECH · NFC
A digital wallet with NFC tap-to-pay — closing the gap Namibian banks haven't.
Android HCESupabasePayments
DEV
APP · 04
FreightMate
LOGISTICS · LOAD BOARD
Digital load board for Southern Africa. Shippers post, transporters bid, AI prices fair market rates.
Next.jsWhatsApp APIAnthropic
DEV
APP · 05
DocuMind
PDF · AI
AI-powered PDF reader and editor. Chat with documents, summarize, translate, compare, extract — without Acrobat's price tag.
Next.jsPDF.jsAnthropic
DEV
APP · 06
TenderBot
GOVERNMENT · AI
AI-powered Namibian government tender aggregator and response document generator.
LLMScrapingNext.js
DEV
APP · 07
VerifyID
IDENTITY · NAMIBIA
Namibian digital document wallet and identity verification portal. KYC built for the local ID landscape.
CVOCRLiveness
CONCEPT
APP · 08
Codex
KNOWLEDGE · AI
Private AI knowledge engine that turns scattered company documents into a single searchable mind.
RAGVector DBLLM
memento codex
remember the code
2019
Est · Founded
257
The Number
03
SaaS Products
Years to Build
05 / 07

How we work

STEP · I
Discover
We study the problem before we solve it. Interviews, audits, competitive review, honest assessment.
STEP · II
Design
Architecture, user flow, visual direction. Everything on paper before anything hits the keyboard.
STEP · III
Build
Lean, fast, iterative. MVPs in weeks, full systems in months. We ship, then we refine.
STEP · IV
Outlast
Documentation, handover, ongoing care. Systems that keep running long after we've gone.
— FIELD NOTES · 05·5 —
05·5 / 07

Field notes

They didn't just deliver a website. They delivered a brand system that finally made our agency feel as serious as we are. The whole team understood it instantly.
B
Bright Ndivayele
FOUNDER · O&BRIGHT SOLUTIONS
SCISSALC built our MVP in three weeks. We've onboarded the first cohort, raised the first cheque, and we're still using their architecture. They build like it actually has to last.
M
Martha S.
FOUNDER · STEALTH FINTECH
We hired them for an audit. We left with a 38-page report, a remediation plan, and a permanent retainer. The depth was uncommon. And the writing was actually readable.
K
Kennedy T.
CTO · LOGISTICS GROUP
— THE JOURNAL · 06 —
06 / 07

The Journal

— APR · MMXXVI
CYBERSECURITY · NAMIBIA

Namibia is not immune: the quiet threat landscape nobody's discussing

Namibia has long operated with the comfortable assumption that hackers target bigger economies. That assumption is expiring. As mobile money penetration increases and government services digitize, the attack surface grows. The awareness hasn't caught up. We break down the threat groups now active in southern Africa, the attack vectors they're using, and what SMBs and government entities should be doing this quarter.
READ THE BRIEF
— MAR · MMXXVI
ENGINEERING · BUILD NOTES

How we ship MVPs in three weeks without cutting corners that matter

The SCISSALC build stack is not glamorous. Next.js, Supabase, Vercel, Stripe, Cloudflare, Anthropic. We picked these tools once and we don't reinvent them. The principle: spend creative energy on what's genuinely new about the problem, not on rebuilding the solved parts. This is a transparent breakdown of how we architect a project from nothing to deployed in under twenty days.
READ THE BRIEF
— FEB · MMXXVI
PHILOSOPHY · STOIC TECH

Memento codex: the discipline we applied to software and why it works

The stoics had a practice: imagine the worst. Not to despair, but to prepare — and to stop being surprised when bad things happen. Applied to software, this means designing for failure, documenting everything, writing code for the next engineer who will read it. "Memento codex" is our operating philosophy. This post is where it comes from and what it demands in practice.
READ THE BRIEF
07 / 07

Start a conversation

257 CCLVII
Whether you're building a product, a company, or something that doesn't have a name yet, tell us about it. We read everything and we reply.
// RECEIVED · WE WILL BE IN TOUCH