🔥 Backburner 🔥
No research is ever complete.
This section is dedicated to projects that have reached a satisfying checkpoint—enough to share insights and methods, but always open to deeper understanding or creative reinterpretation.
Some topics may feel “done for now,” but that’s just the nature of evolving systems. If something here inspires you to pick it up, remix it, or push it further: please do! Whether it’s a deep dive or a side quest, I’d love to hear about what it sparks in your own research.
Stay curious.
🏷️ T2/T3 Lock System Deep Dive
A multi-part exploration of embedded locks, USB bridges, and firmware injection.
This research series closed with a working proof-of-concept for persistent physical access, but it’s far from the last word.
📺 Proof of concept video:
📚 Physical Access, Digital Lies: Full-Stack Lock Exploitation — Phrack Submission 📚
August 19, 2025
🎝️ Audit Me, I Dare You: CP2102 Spoofing and Self-Auditing Lock Failures 🎝️
August 12, 2025
🔓 Ghost in the Lock: Injecting MSP430 Firmware for Undetectable Entry 🔓
August 05, 2025
Dead Bytes Tell No Lies: Injecting Truth into NAND Flash for Access Control Exploitation
July 29, 2025
When Physical Meets Digital: The Early Vulnerabilities That Led to Hardware Hacking
July 23, 2025