Hardware Hacking

26Mar 2016

As security researchers and penetration testers, we use several tools to analyze and research vulnerabilities in network devices and embedded systems with Internet connectivity, also known as IoT devices. Among the tools we use, there are oscilloscopes, logical analyzers, protocol analyzers, and many more. The following list contains some of our favorites tools and resources […]