A vast amphibious wilderness of swamp and forest

Identify, assess, and exploit basic and complex security mechanisms in IoT devices.

In progress

IoT threat landscape

Network hacking

Hardware hacking

Radio hacking

Targeting the ecosystem


Useful books