Breaking Samsung Firmware, or Turning Your S8/S9/S10 into a DIY “Proxmark” Continue reading @pentestpartners.com | 3 years ago
Router hacking, dumping the firmware from an SPI flash chip Continue reading @pentestpartners.com | 4 years ago
Fill your Boots with credential stuffing protections Continue reading @pentestpartners.com | 4 years ago
Minecraft to Metasploit. Game hacking could start your cyber security career Continue reading @pentestpartners.com | 4 years ago
Reverse Engineering the Tesla Firmware Update Process Continue reading @pentestpartners.com | 4 years ago
How to Do Firmware Analysis. Tools, Tips, and Tricks Continue reading @pentestpartners.com | 4 years ago
Tic Toc Pwned – Child tracking smartwatch API flaws Continue reading @pentestpartners.com | 5 years ago
‘Secure by Design’ and SB-327. Standards for a Secure IoT? Continue reading @pentestpartners.com | 5 years ago
Hardware reverse engineering. A tale from the workbench Continue reading @pentestpartners.com | 5 years ago