wrongbaud Profile Banner
wrongbaud Profile
wrongbaud

@wrongbaud

Followers
5K
Following
23K
Media
583
Statuses
3K

Cars, Bikes, Coffee and Embedded Systems Security | Founder @voidstarsec Training and Consulting https://t.co/0ib8fK31Ib https://t.co/YzN9K2LaST

Boston, MA
Joined May 2019
Don't wanna be here? Send us removal request.
@wrongbaud
wrongbaud
4 years
Happy Friday! Looking for weekend reading about hardware hacking?. JTAG: SWD: I2C: SPI: UART:
wrongbaud.github.io
A blog focusing on hardware and software reverse engineering
7
111
441
@wrongbaud
wrongbaud
1 day
RT @0xor0ne: "A Full-Chain Exploit of an Unfused Qualcomm Device". #infosec
Tweet media one
0
62
0
@grok
Grok
6 hours
Join millions who have switched to Grok.
29
36
346
@wrongbaud
wrongbaud
3 days
Worth a read - check this out if you want to learn more about linux internals, phenomenal work @0xAX !.
@0xAX
0xAX
3 days
I've updated the first chapter of linux-insides on the Linux kernel booting process to reflect modern 6.16+ kernels -
0
0
9
@wrongbaud
wrongbaud
3 days
RT @0xAX: And finished to rework 6th part of posts for learning assembly programming for Linux x86_64 -
Tweet card summary image
github.com
Learning assembly for Linux x86_64. Contribute to 0xAX/asm development by creating an account on GitHub.
0
51
0
@wrongbaud
wrongbaud
3 days
RT @MattHartensveld: Class 100 Cleanroom Shed I Built For Semiconductor R&D :)
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
500
0
@wrongbaud
wrongbaud
3 days
New diagrams for an upcoming blog post - super excited for this one:
Tweet media one
0
1
13
@wrongbaud
wrongbaud
5 days
EMFI attacks on the STM32F4:. Tools, code can be found here: .
Tweet media one
0
24
88
@wrongbaud
wrongbaud
7 days
Another batch of kits for our self paced course: Hacking Hardware Debuggers!. This course is a deep dive into reverse engineering JTAG and SWD interfaces from a black box perspective. Want to learn more: . Want free resources on hardware hacking? Check
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
27
140
@wrongbaud
wrongbaud
15 days
RT @nSinusR: Our work on solving @Raspberry_Pi's RP2350 Hacking Challenge is now online! 5 different attacks and lots of lessons learned.….
0
36
0
@wrongbaud
wrongbaud
21 days
RT @rst_con: 🎉 We're heading to @defcon 33! 🎉. Catch us in Vegas this August. We're excited to connect, learn, and show off a sneak peek of….
0
5
0
@wrongbaud
wrongbaud
21 days
RT @hhj4ck: ✅ Just wrapped up my deep-dive on exploiting an unfused Qualcomm QCM2150 POS device (BootROM → root). .
hhj4ck.github.io
Background
0
40
0
@wrongbaud
wrongbaud
25 days
RT @rce_trent: @wrongbaud yo. depthcharge. real time u-boot auditing. (depthcharge-venv) turkeyburger@MacBookPro bin % python depthcharge-….
0
1
0
@wrongbaud
wrongbaud
29 days
RT @ghidraninja: Super excited to launch a second RP2350 hacking challenge together with @Raspberry_Pi! Bring your best side-channel attack….
0
15
0
@wrongbaud
wrongbaud
1 month
RT @layle_ctf: my GBA debugger received a major face lift, it looks so much better now. it's also less chaotic than it used to be due to me….
0
5
0
@wrongbaud
wrongbaud
1 month
RT @MikaelThalen: NEW: A custom firmware for the Flipper Zero, being sold by a Russian hacker for $1K, bypasses modern security protections….
Tweet card summary image
san.com
Hackers are using a custom Flipper Zero firmware to bypass security protections in automotive key fobs, putting millions of vehicles at risk.
0
226
0
@wrongbaud
wrongbaud
1 month
RT @mqst_: 📠 Beginners Guide: How to Build a Hardware Hacking Lab. Blog: author: @wrongbaud. #infosec https://t.co….
0
16
0
@wrongbaud
wrongbaud
1 month
RT @mqst_: 🎮 A First Look at Ghidra's Debugger - Game Boy Advance Edition. Blog: author: @wrongbaud . #infosec htt….
0
25
0
@wrongbaud
wrongbaud
1 month
RT @raelizecom: Google Wifi Pro - Glitching from Root to EL3 - Part 1. In this first post, we explain in detail, how we were able to inject….
0
19
0