Cybervelia
Subscribe
Sign in
Home
Organization
About
Latest
Top
Kernel-Level Stealthy Observation of TTY Streams
TTY Subsystem Interposition for Covert Operations
Feb 4
•
Theodoros Danos
1
1
January 2026
Hacking Django - From a Pentester's View
We dive into Django and discuss common vulnerabilities we find during pentests.
Jan 26
•
Theodoros Danos
3
June 2025
An In-depth research-based walk-through of an Uninitialized Local Variable Static Analyzer
Do you think the battle with ULVs is over? Think again.
Jun 2, 2025
•
Theodoros Danos
3
May 2025
Technical Analysis - A Compromise of a Bluetooth Smart Lock
This article details the successful compromise of a commercially available Bluetooth-enabled smart lock supporting fingerprint and wireless unlocking.
May 14, 2025
•
Theodoros Danos
Reverse Engineering Helium Miner's BLE Comms
This article walks through reverse engineering the Helium Hotspot app to set up a fake (rogue) BLE device that looks like a real hotspot.
May 14, 2025
•
Theodoros Danos
August 2023
Google Cloud Functions are Secure, only if you know how to use them!
Google Cloud Functions are improperly configured, leading to access control vulnerabilities
Aug 29, 2023
•
Theodoros Danos
Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)
How I was able to disable BLE encryption without a blink
Aug 29, 2023
•
Theodoros Danos
Common Developer Pitfalls: A Guide to Bolstering Security
“Breaking their Defense” Series
Aug 9, 2023
•
Theodoros Danos
Breaking their Defense - Hacking Stories
An Eye-Opening Journey Through Eliminating Enterprise-Level Defenses
Aug 5, 2023
•
Theodoros Danos
May 2023
Graphicator Tool!
Release of our new GraphQL tool named Graphicator
May 21, 2023
•
Theodoros Danos
Attack Surface Intelligence? 5 tools to boost your results!
If you are working as a penetration tester, you must be aware of the 5 tools so you can enhance your results.
May 17, 2023
•
Theodoros Danos
Do you develop an IoT product? Read the Top 10 vulnerabilities you should be aware!
If you are an indi-developer, a hardware company or a software company, you must be protected against the following vulnerabilities.
May 17, 2023
•
Theodoros Danos
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts