Security Research blog that you ❤️
Exploit Development, Reverse Engineering, and AI
November 14, 2023
Protecting sensitive data is paramount. A common failure is using weak cryptogra...
#crypto #hashing #security #owasp
Read more November 12, 2023
Broken Access Control moved to the number one spot in the OWASP Top 10 2021. One...
#idor #nodejs #owasp
Read more June 30, 2020
Well if your have been into hacking since around 2012 you know the above headlin...
#certification #oscp #offensive-security
Read more May 11, 2020
This blog covers the subject of u-boot bootloader in depth and how such firmware...
#IOT Security #Linux #Reverse Engineering
Read more August 17, 2019
There is another protocol which works on top of CAN called OBD (On-board diagnos...
#IOT Security #Car Hacking #Automotive Security #Forensics
Read more April 9, 2019
UART stands for Universal Asynchronous Receiver/Transmitter. It's not a communic...
#IOT Security #Hardware Hacking
Read more