Security Research blog that you ❤️

Exploit Development, Reverse Engineering, and AI

Protecting sensitive data is paramount. A common failure is using weak cryptogra...

#crypto #hashing #security #owasp
Read more

Broken Access Control moved to the number one spot in the OWASP Top 10 2021. One...

#idor #nodejs #owasp
Read more

Well if your have been into hacking since around 2012 you know the above headlin...

#certification #oscp #offensive-security
Read more

This blog covers the subject of u-boot bootloader in depth and how such firmware...

#IOT Security #Linux #Reverse Engineering
Read more

August 17, 2019

There is another protocol which works on top of CAN called OBD (On-board diagnos...

#IOT Security #Car Hacking #Automotive Security #Forensics
Read more

UART stands for Universal Asynchronous Receiver/Transmitter. It's not a communic...

#IOT Security #Hardware Hacking
Read more