banner
infinitecyber.bsky.social
@infinitecyber.bsky.social
Embedded device hacking. Likes retro games (SNES / N64).
This year at: https://orangecon.nl/trainings/hardware_hacking
@kbeckmann.bsky.social do you know if there is a possibility to count clock cycles with the pico pio? I used „jmp x— label“ but this only works out after reaching 0. can it be done with an irq? Do you have an idea? :)
June 11, 2025 at 9:57 PM
Reposted
Early bird tickets for OrangeCon are available until June 1st. If you’re thinking about coming, now’s a good time to grab your spot and save a little. Hope to see you there! #OrangeCon #CyberSec
May 28, 2025 at 10:01 AM
Reposted
implemented a script for #GlasgowInterfaceExplorer that lets you discover the connectivity of any IC with JTAG boundary scan, provided you can give the IC an arbitrary stimulus (here done by using a glasgow output connected to a needle point probe)
May 24, 2025 at 7:18 PM
Reposted
OrangeCon is open for CFP! Working on something exciting in cybersecurity? Submit your talk and maybe you’ll be part of the 2025 lineup: pretalx.com/orangecon-20...
May 16, 2025 at 8:00 AM
Reminder! In case if you cannot get access to your IoT device / router - try the infamous pin to poke method. Here is a quick demo on how to bypass the password protection of an UART interface on a router.

youtu.be/HRPFub17kTc?...
Pin to Poke - How to hack your router!
YouTube video by Infinite Cyber
youtu.be
May 5, 2025 at 6:21 PM
Reposted
Join Roman Stuehler’s 2-day hands-on training and learn to dump firmware, bypass protections, and glitch locked chips. This training includes a €300 hardware kit!
Details and registration: orangecon.nl/trainings/ha...
At Orangecon you'll hack hardware like a pro!
April 28, 2025 at 4:00 PM
Reposted
At OrangeCon, we offer affordable hands-on trainings and insightful talks. No nonsense, just real skills and knowledge. Grab your hacker hoodie and join us for a laid-back, yet impactful experience. #OrangeCon #Cybersecurity
April 25, 2025 at 4:31 PM
This week, I played around with the RDP1 of an STM32. Yesterday, I got my glitch stable. If you want to extract the firmware of your IoT devices and get into embedded device hacking, you can find me this year at @orangecon.nl. There, we will pick an easier target and not use an FPGA but a Rasp Pico.
March 14, 2025 at 5:35 PM