Technical Research
Malware analysis, exploitation techniques, and security research findings.
Glitching U-Boot Bootloader to Gain Shell
Comprehensive analysis of U-Boot bootloader internals and security vulnerabilities. Discovered critical 1-second attack window enabling complete device compromise.
From 1-Second Window to Persistent Root Shell
How a small 1-second boot delay vulnerability escalates into complete system compromise with persistent remote SSH root access. Demonstrates cascading security failures.
Hardware-Bound LUKS Storage Encryption
Building secure embedded Linux systems with CPUID-derived encryption keys. Complete implementation guide for hardware-locked storage using LUKS and Yocto.
Sudo Chroot Vulnerability
Proof of concept and detailed analysis of the sudo chroot security flaw affecting Linux distributions worldwide.
Remcos RAT Analysis
In-depth malware analysis of Remcos RAT with comprehensive behavioral and static analysis.
NetSupport Analysis
Comprehensive analysis of NetSupport malware including network behavior and persistence mechanisms.
AsyncRat Analysis
Detailed analysis of AsyncRat including command and control infrastructure and evasion techniques.
AESRT Ransomware
Comprehensive .NET source code analysis of AESRT Ransomware including encryption mechanisms and persistence.
Malware Analysis Collection
Access the full archive of malware analysis blogs, research notes, and technical findings on Notion.