How to Kill a Tesla via Bluetooth

Continue reading


@pentestpartners.com | 1 month ago

How to Do Firmware Analysis. Tools, Tips, and Tricks

Continue reading


@pentestpartners.com | 1 month ago

Cobalt Strike Walkthrough for Red Teamers

Continue reading


@pentestpartners.com | 2 months ago

Tic Toc Pwned – Child tracking smartwatch API flaws

Continue reading


@pentestpartners.com | 2 months ago

GPS watch issues… Again

Continue reading


@pentestpartners.com | 4 months ago

Tracking and snooping on a million kids

Continue reading


@pentestpartners.com | 7 months ago

‘Secure by Design’ and SB-327. Standards for a Secure IoT?

Continue reading


@pentestpartners.com | 8 months ago

Running a Security Awareness Program

Continue reading


@pentestpartners.com | 8 months ago

Hacking a Nerf Assault Tank

Continue reading


@pentestpartners.com | 9 months ago

Hardware reverse engineering. A tale from the workbench

Continue reading


@pentestpartners.com | 12 months ago

Totally Pwning the Tapplock Smart Lock

Continue reading


@pentestpartners.com | 1 year ago

Penetration Testing Requirements for GDPR

Continue reading


@pentestpartners.com | 1 year ago