Blogs

Recovering Useful Metadata from .NET NativeAOT Binaries

NativeAOT turns .NET apps into fully native executables, which confuses IL decompilers. But key metadata such as type hierarchy, method tables, and frozen strings can be recovered by locating the ReadyToRun directory and rehydrating its dehydrated data blob. This post shows what to look for and gives starter scripts to make Ghidra or IDA friendlier.

#Reverse Engineering#Hardware Security#Router Security
IoTSRG Team
August 27, 2025
6 min read

CIS Benchmark vs NIST vs Compliance - Explained

When you are working in security - especially around IoT, firmware, or enterprise systems - understanding these three areas is helps you the work. Let’s break them down like a troubleshooting guide

#compliance#CIS-Benchmark#NIST Frameworks
IoTSRG Team
July 21, 2025
4 min read

Unlocking Full Shell Functionality: UART RX Mitigation Bypass on TL-WR841N

A step-by-step walkthrough for bypassing UART RX mitigations on the TP-Link TL-WR841N router to achieve full shell access for advanced security research.

#UART#TL-WR841N#Reverse Engineering+2 more
IoTSRG Team
September 27, 2024
15 min read

Can`t buy a jtagualator then build it - DIY build under 75USD

Building your Jtagulator

#JTAG#Debugger#Reverse Engineering+1 more
IoTSRG Team
September 27, 2024
3 min read

Hack the IoT: The 1st Year of Crazy CTFs, Workshops, and Unforgettable Villages

A retrospective of IoTSecurity101’s first year, highlighting groundbreaking CTFs, hands-on workshops, and community-driven events that shaped the IoT security community.

#IoT#Security#CTF+2 more
IoTSRG Team
September 22, 2024
4 min read

Microprobing with ICEBite - A Definitive Guide for Solderless Testing Probes

Learn how to leverage the open-hardware ICEBite tool for precise, solderless PCB testing and inspection, tailored for IoT hardware analysis.

#ICEBite#IoT#Hardware Security+2 more
IoTSRG Team
July 14, 2024
3 min read

eMMC Chip Removal and Reballing Guide

Explore the professional eMCP desoldering process to uncover vulnerabilities in embedded multi-chip packages, complete with safety considerations and step-by-step guidance.

#eMCP#IoT#Hardware Security+3 more
IoTSRG Team
November 22, 2023
3 min read