(function(i,s,o,g,r,a,m){ i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)}, i[r].l=1*new Date(); a=s.createElement(o),m=s.getElementsByTagName(o)[0]; a.async=1; a.data-privacy-src=g; m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-132428928-1', 'auto'); ga('send', 'pageview');

firmware

My CPAP has a recall; let’s open it instead!

2023-08-13T12:50:04-04:00

"If you or a loved one has ever used a CPAP device..." Our President, Jose Fernandez, gave a medical device presentation at BioHacking Village during DefCon 31. This presentation focused on bringing awareness to privacy related issues related CPAP devices, how to passively identify some CPAP devices and follow on work for exploit related research for [...]

My CPAP has a recall; let’s open it instead!2023-08-13T12:50:04-04:00

Autodyne: Automated firmadyne for firmware emulation

2022-12-04T16:21:19-05:00

Emulate device firmware using containers with Autodyne. We crossed 2k pulls on dockerhub! Our CI pipeline for daily updated images for ubuntu 18 / ubuntu 20 has been growing strong since we open-sourced the images. Daily Docker images: https://hub.docker.com/r/compsecdirect/autodyne Check out our Github project and please submit issues related the tool there: https://github.com/compsecdirect/autodyne

Autodyne: Automated firmadyne for firmware emulation2022-12-04T16:21:19-05:00

CompSec Direct recognized by Microsoft with Firmware analysis specialization

2024-12-16T19:04:36-05:00

CompSec Direct is Microsoft recognized for firmware analysis. This is a new specialization within the Defender for IoT ecosystem of Microsoft's security portfolio. We can help your organization find vulnerabilities within your IoT devices and prioritize changes to ensure resilience within your IoT equipment.

CompSec Direct recognized by Microsoft with Firmware analysis specialization2024-12-16T19:04:36-05:00
Go to Top