Blog
Home / Blog

Security Advisory: Multiple Vulnerabilities in Syrotech Router
Overview: Our security research has uncovered multiple high-risk vulnerabilities in the Syrotech SY-GPON-1110-WDONT router. These issues pose serious risks, including unauthorized access, data exposure, and

Hackers Love Untrained Users — Don’t Be One
Hackers Love Untrained Users — Don’t Be One In today’s fast-paced and digitally driven world, cybersecurity has taken center stage. With cyber threats becoming more

Introduction To Assembly Language
Assembly language programming is a fascinating discipline that allows developers to interact directly with a computer’s hardware. This guide introduces you to the fundamentals of

Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326
A critical privilege escalation vulnerability (CVE-2024-28326) has been identified in the Asus RT-N12+ B1 router. The device exposes an unrestricted root terminal via its UART

A Guide to Server-Side Template Injection (SSTI)
Web applications often use template engines to dynamically generate web pages by combining static templates with runtime data. While template engines make development faster and

Getting Started with Hardware Hacking
Ever been curious about hardware hacking but didn’t know where to begin? You’re not alone. At first glance, hardware hacking and reverse engineering can feel

Unlocking Firmware Customization with the CH341A Programmer and ESP-01 Module
Unlocking Firmware Customization with the CH341A Programmer and ESP-01 Module Firmware customization has become a core skill in hardware hacking and cybersecurity research. With the

EXPLIoT: A Framework For Exploiting And Securing IoT Devices
EXPLIoT: A Framework for Exploiting and Securing IoT Devices Smart devices have become part of our daily lives—helping us save time, automate tasks, and improve

Flying Secure- A Comprehensive Guide to the Nabhyaan Drone
Drones are no longer just hobby gadgets—they’ve become critical assets across industries like agriculture, surveillance, defense, and logistics. The Nabhyaan Drone, with its advanced design

Security Advisory – Multiple Vulnerabilities in LB-link BL-W1210M Router
Routers form the backbone of modern digital infrastructure, enabling connectivity for homes, businesses, and entire networks. However, when vulnerabilities exist in these devices, they can

Domain Trusts: An Exploitation Playbook
Domain Trusts: An Exploitation Playbook Understanding domain trusts in Windows Active Directory (AD) is essential for modern cybersecurity professionals. These trust relationships are the backbone

Car Hacking- The New Frontier In Cybersecurity
Car Hacking- The New Frontier In Cybersecurity As cars transform into rolling computers, they bring not just convenience—but also new risks. Modern vehicles are no