PurpleSynapzMessage StealingThere are popular messaging apps that don’t require a very complex exploits to steal users’ messages, if app developers make a couple of…Sep 11Sep 11
PurpleSynapzRattling RoutersRouters are one of the most commonly used IOT devices. Hence we take a sneak peak into Router SecurityJul 15Jul 15
PurpleSynapzIoT Firmware Exploit DerivationData shows that only 5% of the CVE’s have publicly available exploits. For the rest of them, we’re just left with CVE’s describing very…Jun 19Jun 19
PurpleSynapzDefusing MalwaresCaution/Warning: Hacking back malwares infrastructures (excluding ransomware decryption & recovery) may negatively impact it’s ongoing…Feb 16Feb 16
PurpleSynapzSniffing GSM network using SDR scanningCaution: The research experiments are conducted in faraday bag controlled environment. Any uncontrolled imitation in the real world…Jan 23Jan 23