Blogs
CIS Benchmark vs NIST vs Compliance - Explained
When you are working in security - especially around IoT, firmware, or enterprise systems - understanding these three areas is helps you the work. Let’s break them down like a troubleshooting guide
Unlocking Full Shell Functionality: UART RX Mitigation Bypass on TL-WR841N
A step-by-step walkthrough for bypassing UART RX mitigations on the TP-Link TL-WR841N router to achieve full shell access for advanced security research.
Can`t buy a jtagualator then build it - DIY build under 75USD
Building your Jtagulator
Hack the IoT: The 1st Year of Crazy CTFs, Workshops, and Unforgettable Villages
A retrospective of IoTSecurity101’s first year, highlighting groundbreaking CTFs, hands-on workshops, and community-driven events that shaped the IoT security community.
Microprobing with ICEBite - A Definitive Guide for Solderless Testing Probes
Learn how to leverage the open-hardware ICEBite tool for precise, solderless PCB testing and inspection, tailored for IoT hardware analysis.
eMMC Chip Removal and Reballing Guide
Explore the professional eMCP desoldering process to uncover vulnerabilities in embedded multi-chip packages, complete with safety considerations and step-by-step guidance.