Blog
Home / Blog

Securing Web Uploads: Extension Denylisting
Securing Web Uploads: Extension Denylisting Feb 20, 2024 Web Application Tarak Sakhardande At the forefront of cybersecurity lies an ever-present battle between web defenders and

Decoding I2C: Mastering the Communication Protocol
Decoding I2C: Mastering the Communication Protocol Feb 12, 2024 Hardware Gaurav Choudhari In the early 1980s, Philips Semiconductors (now NXP Semiconductors) introduced the I2C (Inter-Integrated

Subdomain Enumeration: Leveraging Web Architecture’s Power
Subdomain Enumeration: Leveraging Web Architecture’s Power Feb 8, 2024 Web Application Tarak Sakhardande Subdomain enumeration is a critical process for researchers, security professionals, and enthusiasts

Exploring the Fundamentals of Rust Programming
Exploring the Fundamentals of Rust Programming Feb 7, 2024 Wireless Network Joseph Simon Rust is an efficient systems programming language designed by Mozilla that stands

Unveiling Vulnerabilities: Exploring SWD Attack Surface in Hardware
Unveiling Vulnerabilities: Exploring SWD Attack Surface in Hardware Feb 2, 2024 Hardware Gaurav Choudhari SWD stands as one of the lesser-noticed vulnerabilities of hardware security.

JWT: A Deep Dive into Algorithm Confusion
JWT: A Deep Dive into Algorithm Confusion Feb 1, 2024 Web Application Tarak Sakhardande Since the first time I studied JWT, I found it one

Decoding JTAG: Unveiling and Validating Headers on Your Device
Decoding JTAG: Unveiling and Validating Headers on Your Device January 25, 2024 Hardware Gaurav Choudhari JTAG headers play an essential role in embedded systems development,

Introduction to EDR Evasion: API Hooking
Introduction to EDR Evasion: API Hooking Januany 24, 2024 Red Team Shashi Kant Prasad Endpoint Detection and Response (EDR) solutions are essential for monitoring and

Hardware Hacking for IoT Devices – Offensive IoT Exploitation
Hardware Hacking for IoT Devices – Offensive IoT Exploitation January 20, 2024 Hardware Gaurav Choudhari In the world of smart devices, IoT devices are becoming

JTAG Security: Unlocking the Potential of Hardware Hacking
JTAG Security: Unlocking the Potential of Hardware Hacking January 1, 2024 Hardware Gaurav Choudhari With this comprehensive guide, we aim to demonstrate how the Joint

Securing AWS: Importance of Penetration Testing & Best Practices
Securing AWS: Importance of Penetration Testing & Best Practices January 1, 2024 AWS Shashi Prasad Unlock the full potential of AWS cloud computing while ensuring

Hacking Wireless Doorbells
Hacking Wireless Doorbells December 29, 2023 Hardware Gaurav Choudhari As technology continues to advance, so do the methods used by hackers and security enthusiasts to