navbar_logo
Home
About
What We Do
Research
Events
Gallery
Blogs
Team
Contact
Store

Blogs

Tags

All Posts#CIS-Benchmark#CTF#Community#Debugger#Dumping#Hardware Security#ICEBite#IoT#JTAG#Microprobing#NIST Frameworks#Penetration Testing#Reverse Engineering#Router Security#Security#TL-WR841N#UART#Workshops#compliance#eMCP#eMMC

Tags

All Posts#CIS-Benchmark#CTF#Community#Debugger#Dumping#Hardware Security#ICEBite#IoT#JTAG#Microprobing#NIST Frameworks#Penetration Testing#Reverse Engineering#Router Security#Security#TL-WR841N#UART#Workshops#compliance#eMCP#eMMC

Recovering Useful Metadata from .NET NativeAOT Binaries

NativeAOT turns .NET apps into fully native executables, which confuses IL decompilers. But key metadata such as type hierarchy, method tables, and frozen strings can be recovered by locating the ReadyToRun directory and rehydrating its dehydrated data blob. This post shows what to look for and gives starter scripts to make Ghidra or IDA friendlier.

#Reverse Engineering#Hardware Security#Router Security
IoTSRG Team
August 27, 2025
6 min read

Unlocking Full Shell Functionality: UART RX Mitigation Bypass on TL-WR841N

A step-by-step walkthrough for bypassing UART RX mitigations on the TP-Link TL-WR841N router to achieve full shell access for advanced security research.

#UART#TL-WR841N#Reverse Engineering+2 more
IoTSRG Team
September 27, 2024
15 min read

IoT Security Research Group

Crafting the tools that hackers and engineers need to break barriers and exploit vulnerabilities, all at hacker-friendly prices.

Quick Links

  • Our Team
  • Projects
  • Partners

© 2025 IoT Security Research Group. All rights reserved.