// RESEARCH

Security Research

Technical analysis, vulnerability research, and defensive strategies from enterprise penetration testing operations

~30 min read

Beyond Checklists: How I Harvested Millions of Customer Records in 14 Days

How methodical analysis, relentless persistence, and pattern recognition led to uncovering a critical authentication bypass vulnerability affecting a major telecommunications provider. A complete breakdown of dismantling architectural assumptions across 300+ API endpoints, exposing millions of customer records through JavaScript analysis and AI-powered fuzzing.

API Security Authentication Bypass JWT OAuth2 JavaScript Analysis Bug Bounty
Read Full Article →
Author: Adnan Ahmad
~20 min read

MapleWater: A Dive into Automatic Meter Reading (AMR) Technology

Deep technical analysis of the R900 water meter system—one of North America's most widely deployed AMR systems. Explore how we decoded unencrypted wireless utility infrastructure, built a Python decoder using RTL-SDR hardware, and discuss the serious privacy and security implications of broadcasting consumption data in plaintext every 14 seconds.

RTL-SDR AMR R900 Signal Processing Python Manchester Decoding
Read Full Article →
Author: Adnan Ahmad
~25 min read

OpenDroneDome: Multi-Protocol RF Drone Defense System

Production-ready implementation of multi-protocol drone defense using RTL-SDR and HackRF hardware. Covers detection and neutralization across ExpressLRS, DJI OcuSync, Crossfire, WiFi-based systems, and Bluetooth drones. Includes source-code samples, verified frequencies, and comprehensive legal analysis.

RTL-SDR HackRF ExpressLRS DJI OcuSync Python Scapy
Read Full Article →
Author: Adnan Ahmad
More research articles coming soon...

Future topics: Enterprise network penetration methodologies, mainframe security assessment techniques, zero-trust architecture evaluation, container escape vectors, cloud infrastructure exploitation patterns

// TOPICS

RF & Wireless Security

Drone defense, spectrum analysis, protocol reverse engineering, SDR applications

Infrastructure Security

Mainframe systems, legacy platforms, SCADA networks, critical infrastructure

Enterprise Architecture

Cloud security, container escape, zero-trust evaluation, supply chain analysis