NativeAOT turns .NET apps into fully native executables, which confuses IL decompilers. But key metadata such as type hierarchy, method tables, and frozen strings can be recovered by locating the ReadyToRun directory and rehydrating its dehydrated data blob. This post shows what to look for and gives starter scripts to make Ghidra or IDA friendlier.
When you are working in security - especially around IoT, firmware, or enterprise systems - understanding these three areas helps you with the work. Let's break them down like a troubleshooting guide.
A step-by-step walkthrough for bypassing UART RX mitigations on the TP-Link TL-WR841N router to achieve full shell access for advanced security research.
Hello, everyone! Welcome to this blog where we delve into the motivation and process of building a **JTAGulator**, an invaluable tool for test engi...
A retrospective of IoTSecurity101’s first year, highlighting groundbreaking CTFs, hands-on workshops, and community-driven events that shaped the IoT security community.
A retrospective of IoTSRG first year, highlighting groundbreaking CTFs, hands-on workshops, and community-driven events that shaped the IoT security community.
Learn how to leverage the open-hardware ICEBite tool for precise, solderless PCB testing and inspection, tailored for IoT hardware analysis.
eMCP desoldering is a high-end hardware hacking method used when software access is blocked, since eMCP packages combine both NAND storage and DRAM i...