PinnedTaking Over ROS Robots: Comic StyleThis time, I was thinking to post something fun yet informative, and it ended up with a comic style post. I know we have not explored much…Sep 20Sep 20
PinnedUnderstanding of Voltage Fault Injection — Glitching AttackUnmasking Voltage Fault Injection: A Deep Dive into Crowbar Glitching Attack StrategiesSep 13Sep 13
PinnedPublished inAutoSecurityyMQTT Security 101: A Quick Guide to Finding and Exploiting VulnerabilitiesDive into MQTT network security, offering practical steps to pentest & protect your IoT systems. It covers essential topics like…Aug 31Aug 31
PinnedUART- Shell Access to RouterSo, it was my birthday, but I was alone, so there was no celebration or cake cutting. I was bored, I looked around me and saw a router…Feb 6, 2022Feb 6, 2022
Self Study for Ethical Hacking (2024 Edition)Alright, today we’re diving into how to start learning cybersecurity or ethical hacking through self-study. I get asked this question a…Oct 18Oct 18
The Intersection of AI, Autonomous Driving, and CybersecurityAs autonomous driving technology continues to advance, the integration of artificial intelligence (AI), particularly Large Language Models…Aug 30Aug 30
Published inAutoSecurityyHow to Become a Vehicle Pentester ?Step-by-step guide on how to become a vehicle pentester.Mar 18Mar 18
Published inAutoSecurityyElectroquest: A Dark Turn in the EV Charging SagaThe story of “Vehicle Breachers’ exploits in uncovering the EV protocol vulnerability becomes an inspiration for cybersecurity enthusiasts.Jul 2, 2023Jul 2, 2023
Published inAutoSecurityyElectroquest: Hacking the Future of MobilityIn this debut storytelling adventure, prepare to be captivated as we navigate the virtual landscapes where Connected Vehicles and…Jun 24, 2023Jun 24, 2023
Published inAutoSecurityy🚘Enhancing Automotive Security: Protecting Connected Cars’ FutureMay 25, 2023May 25, 2023