Skip to content
View falcnix's full-sized avatar
πŸ’­
Hack the embedded devices away!
πŸ’­
Hack the embedded devices away!

Block or report falcnix

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
falcnix/README.md

πŸ’« About Me:

I am a curiosity-driven cybersecurity engineer. I like breaking IoT devices and hacking cloud infrastructures. Learning and understanding how we humans function(neuroscience) so I could hack my behavior to optimize my life. I would love to collaborate on any IoT and cloud related projects. Please feel free to reach out in any point of time.

🌐 Socials:

LinkedIn Medium Twitter


πŸ’» My Latest Blog posts:

β–Ά ... view more


Talks and Trainings

# Conferece Talks Year
1 Null Community - Bangalore Talks 2022
2 Null IoT Security 101 Workshop - Bangalore Training 2023
3 Bsides IoT and Hardware Security Workshop - Bangalore Training 2023

Projects

# Project Name Release Year Use of it
1 Vulnerable Cognito Applicattion 2022 A simple web app that can be used to practice various AWS Cognito attacks
2 Cognito Creds 2022 Python based tool to fetch authenticated and unauthenticated AWS creds through cognito

Pinned Loading

  1. Vulnerable-Cognito-application- Vulnerable-Cognito-application- Public

    A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.

    HTML 11 1

  2. getCognitoCreds getCognitoCreds Public

    Forked from 0xAs1F/getCognitoCreds

    Python

  3. IoTSecurity101 IoTSecurity101 Public

    Forked from V33RU/IoTSecurity101

    A Curated list of IoT Security Resources

  4. Hacking-a-Bluetooth-Device Hacking-a-Bluetooth-Device Public

    This repository contains all the slides, code and APK required to simulate the attacks demonstrated in the Null Kolkata session.

    C++ 5