Technical Research

Malware analysis, exploitation techniques, and security research findings.

Research • Part 1 Aug 2025

Glitching U-Boot Bootloader to Gain Shell

Comprehensive analysis of U-Boot bootloader internals and security vulnerabilities. Discovered critical 1-second attack window enabling complete device compromise.

Research • Part 2 Aug 2026

From 1-Second Window to Persistent Root Shell

How a small 1-second boot delay vulnerability escalates into complete system compromise with persistent remote SSH root access. Demonstrates cascading security failures.

Research Jan 2026

Hardware-Bound LUKS Storage Encryption

Building secure embedded Linux systems with CPUID-derived encryption keys. Complete implementation guide for hardware-locked storage using LUKS and Yocto.

CVE-2025-32463 Jan 2025

Sudo Chroot Vulnerability

Proof of concept and detailed analysis of the sudo chroot security flaw affecting Linux distributions worldwide.

Malware Analysis Remcos RAT

Remcos RAT Analysis

In-depth malware analysis of Remcos RAT with comprehensive behavioral and static analysis.

Malware Analysis NetSupport

NetSupport Analysis

Comprehensive analysis of NetSupport malware including network behavior and persistence mechanisms.

Malware Analysis AsyncRat

AsyncRat Analysis

Detailed analysis of AsyncRat including command and control infrastructure and evasion techniques.

Source Review Ransomware

AESRT Ransomware

Comprehensive .NET source code analysis of AESRT Ransomware including encryption mechanisms and persistence.

Archive

Malware Analysis Collection

Access the full archive of malware analysis blogs, research notes, and technical findings on Notion.

⌘K to search