Blog

Return to .Text

Prerequisites In this article, we are going to quickly discuss a ROP technique called ‘return to .text’[…]

Defcon 27: Hacking the Badge

What did we do? We made modifications to the DEFCON27 Badge and turned it into a ‘Jackp0t’[…]

Zero-Day Research: ICSA-19-113-01 Rockwell Automation MicroLogix 1400 and CompactLogix 5370 Controllers

Background As technology continues to advance and more devices become networked together, new vulnerabilities will inevitably rise[…]

SUBZero: A DIY Pi Zero USB Network-Attached Storage Device

TLDR Quite often I find myself on the go, in need of storing/sharing files on a local[…]

Cybersecurity 101: Can you hear me now?

 Imagine a world where everything you ever needed was in a single place. A place where all[…]

Securing Your Social Media

Hello World! This is the first post on my website and I want to kick things off[…]