eShard’s Post

View organization page for eShard, graphic

2,441 followers

The second part of our series on the Tenda AC15 router vulnerability is out 🔥 This time, we explore time travel analysis, a powerful technique for uncovering vulnerabilities. If you’re into binary analysis or just curious about innovative methods in cybersecurity, this blog is definitely worth your time. 🔗 Check out: https://lnkd.in/evP-B5UF If you missed the first part, you can start here: https://lnkd.in/ebEicd2r

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics