Blog
Home / Blog

Unlocking Firmware Customization with the CH341A Programmer and ESP-01 Module
Unlocking Firmware Customization with the CH341A Programmer and ESP-01 Module Firmware customization has become a core skill in hardware hacking and cybersecurity research. With the

EXPLIoT: A Framework For Exploiting And Securing IoT Devices
EXPLIoT: A Framework for Exploiting and Securing IoT Devices Smart devices have become part of our daily lives—helping us save time, automate tasks, and improve

Flying Secure- A Comprehensive Guide to the Nabhyaan Drone
Drones are no longer just hobby gadgets—they’ve become critical assets across industries like agriculture, surveillance, defense, and logistics. The Nabhyaan Drone, with its advanced design

Security Advisory – Multiple Vulnerabilities in LB-link BL-W1210M Router
Overview: Our security research has identified several critical vulnerabilities in the LB-Link BL-W1210M router. These flaws could enable attackers to bypass security protocols, gain unauthorized

Domain Trusts: An Exploitation Playbook
Domain Trusts: An Exploitation Playbook Understanding how domain trusts operate in Windows Active Directory has become a critical skill in modern cybersecurity. Trust relationships—meant to

Car Hacking- The New Frontier in Cybersecurity
As cars evolve into highly connected, computer-driven machines, they are also becoming new targets for cybercriminals. Modern vehicles now feature infotainment systems, autonomous driving capabilities,

Security Advisory – Multiple Vulnerabilities in Netgear WNR614 Router
Overview Our security analysis has uncovered multiple vulnerabilities in the Netgear WNR614 router. The Netgear WNR614 Router is renowned for its dependable performance, reliable connectivity,

Analyzing Firmware and Extracting Filesystem
Firmware is an embedded piece of software used in hardware devices to control their functionality, typically stored in nonvolatile memory and designed to provide specific

Strategies for Small and Mid-Sized Businesses (SMBs)
Small and medium-sized businesses (SMBs) are quickly adopting online business models to increase brand recognition and customer base, which places them at risk from cyberattacks.

Using Win32 API with Rust
The Win32 API, a fundamental interface for Windows operating system programming, provides a rich set of functionalities for interacting with Windows.Rust can also harness the

Digisol DG GR1321’s Password Storage in Plaintext CVE-2024-4232
Password storage is the practice of securely saving user passwords in a way that prevents unauthorized access and protects against potential security breaches. The Digisol

Digisol DG GR1321’s Improper Access Control CVE-2024-4231
The Improper Access Control vulnerability is present in the Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version: v3.2.02) due to the absence of proper access control