IT meets OT
From Prompt to Plant Shutdown: Agent Context Contamination in the Model Context Protocol (MCP)
- 2025-07-14
Analysis of the Growatt MIC600TL-X and ShineWIFI-X solar inverter system
- 2024-07-27
Cybersecurity Analysis of the SolaX Power inverter system and cloud
- 2024-06-18
Cybersecurity Analysis of the Sungrow inverter system
- 2024-04-21
Balcony in the cloud: Security analysis of the Hoymiles HM microinverter system
- 2024-01-02
Rooting the Cradlepoint IBR600C Router
- 2024-01-02
Playing with the Siemens LOGO!8.3
- 2023-12-12
Bosch Smart Home Part 5: Set up mitmproxy to sniff TLS traffic between Bosch Smart Home App and Cloud
- 2023-12-05
Bosch Smart Home Part 4: Set up mitmproxy to sniff TLS traffic of the Bosch Smart Home Controller
- 2023-12-04
Bosch Smart Home Part 3: The Universal Smart Home Ping of Death
- 2023-12-03
Bosch Smart Home Part 2: Extracting the Firmware of a Smart Home Device with Electromagnetic Fault Injection
- 2023-12-02
Bosch Smart Home Part 1: Rooting the Bosch SmartHome Controller I
- 2023-12-01
JTAG resurrection with Electromagnetic Fault Injection against the Texas Instrument TM4C12x microcontroller family.
- 2022-08-31