Instagram

All Stories

Neverwave: IDS/IPS like functionality in your browser with TLS inspection

During the last years IDS/IPS technology has helped to detect malicious activity not only in the server side but also in the clients side. Actually, we experience an increasing volume...

In Projects, Jun 14, 2020

Pentesting iOS Apps with OSX and a Jailbroken device

Today we will explain how to perform a basic security assessment on an iOS Application using Mac. For this assessment it is mandatory your IOS device is jailbroken. I assume you have ...

In hacking, reversing, Apr 05, 2020

OT Security at h-c0n 2020

Over the last few years OT devices have been increasingly exposed to the internet, IoT devices have progressively approached the industry and this has caused us to face different chal...

In talks, hw-hacking, iot-security, Jan 31, 2020

Drainware

Between 2011 and 2014 we developed a Cloud Platform with DLP capabilities, now in 2020 it is Open Source. It was a very cool technology at that time, we used mongo, redis, rabbitmq, ...

In Projects, Jan 22, 2020

Klara: Private retrohunting platform

Let’s talk about malware hunting. Sometimes you may find an interesting malware sample, and after reversing it you realize that the binary has characteristics that make it unique like...

In intelligence, research, Apr 18, 2019

attribution.id: Lurking threat actors and targets with VT

Lurking threat actors and targets with VT

In Projects, Mar 28, 2019

Dynamic win32 malware analysis on Linux

Sometimes we don’t have a Windows machine for analyzing a malware sample. If the sample is very simple and is not interacting much with the operating system, we can use Linux.

In reversing, Feb 24, 2019

UART access. Hardware Hacking with Bus Pirate

Bus Pirate is a flexible tool for hardware hacking that enables a universal bus interface that talks to most chips. It supports several protocols:

In hw-hacking, iot-security, Feb 17, 2019

Real-time processing with Python

Sometimes we need to process tons of data, but scaling application is not easy, above all in python. That’s why I started researching about real-time data processing and I found out A...

In research, devop, Feb 08, 2019

An Introduction To Hash Cracking

title: “An Introduction to Hash Cracking”date: “2020-8-9”image: assets/images/hashcracking.jpgauthor: namelayout: posttags: [ hash, cracking, coding]categories: [ hashcracking ]When i...

In Jan 30, 2019