Blog

Research articles, deep dives, and technical analysis.

Reverse Engineering Firmware Update Protocol
Analyzing Memory Corruption in Embedded Systems
Network Traffic Analysis with Custom Tools