Cybervelia
Subscribe
Sign in
Home
Organization
About
GraphQL exploitation – The ultimate guide
So you are a tester and you would like to know more about GraphQL Testing.
May 16, 2023
•
Theodoros Danos
1
An In-depth research-based walk-through of an Uninitialized Local Variable Static Analyzer
Do you think the battle with ULVs is over? Think again.
Jun 2, 2025
•
Theodoros Danos
3
Technical Analysis - A Compromise of a Bluetooth Smart Lock
This article details the successful compromise of a commercially available Bluetooth-enabled smart lock supporting fingerprint and wireless unlocking.
May 14, 2025
•
Theodoros Danos
Most Popular
View all
An In-depth research-based walk-through of an Uninitialized Local Variable Static Analyzer
Jun 2, 2025
•
Theodoros Danos
3
Google Cloud Functions are Secure, only if you know how to use them!
Aug 29, 2023
•
Theodoros Danos
Hacking Smartwatches for Spear Phishing
May 17, 2023
•
Theodoros Danos
Breaking their Defense - Hacking Stories
Aug 5, 2023
•
Theodoros Danos
Attack Surface Intelligence? 5 tools to boost your results!
May 17, 2023
•
Theodoros Danos
Technical Analysis - A Compromise of a Bluetooth Smart Lock
May 14, 2025
•
Theodoros Danos
Latest
Top
Reverse Engineering Helium Miner's BLE Comms
This article walks through reverse engineering the Helium Hotspot app to set up a fake (rogue) BLE device that looks like a real hotspot.
May 14, 2025
•
Theodoros Danos
Google Cloud Functions are Secure, only if you know how to use them!
Google Cloud Functions are improperly configured, leading to access control vulnerabilities
Aug 29, 2023
•
Theodoros Danos
Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)
How I was able to disable BLE encryption without a blink
Aug 29, 2023
•
Theodoros Danos
Common Developer Pitfalls: A Guide to Bolstering Security
“Breaking their Defense” Series
Aug 9, 2023
•
Theodoros Danos
Breaking their Defense - Hacking Stories
An Eye-Opening Journey Through Eliminating Enterprise-Level Defenses
Aug 5, 2023
•
Theodoros Danos
Graphicator Tool!
Release of our new GraphQL tool named Graphicator
May 21, 2023
•
Theodoros Danos
Attack Surface Intelligence? 5 tools to boost your results!
If you are working as a penetration tester, you must be aware of the 5 tools so you can enhance your results.
May 17, 2023
•
Theodoros Danos
Do you develop an IoT product? Read the Top 10 vulnerabilities you should be aware!
If you are an indi-developer, a hardware company or a software company, you must be protected against the following vulnerabilities.
May 17, 2023
•
Theodoros Danos
How skillful are you in BLE Security?
This is a question for all of you reading this article: How good are your skills at pen-testing BLE devices?
May 17, 2023
•
Theodoros Danos
See all
Cybervelia
We analyze and explain insecure code patterns
Subscribe
Cybervelia
Subscribe
About
Archive
Sitemap
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts