Searching Firmware for Hardcoded Secrets
From Unlocked Bootloader to Root Shell
Detailing a vulnerability in the Viidure mobile application that fails to validate server certificates in TLS communications
Detailing the Hanwha firmware file decryption method
A guide for conducting an IoT Pentest
A prioritized list of tools for getting started in hardware hacking
Proxying HTTP traffic from mobile devices using Caido and Frida
Critical encryption flaws discovered in UDP P2P protocol in VStarcam CB73
Firmware extraction and reverse engineering of VStarcam CB73 root password