HardenWall Systems
Operational
Restricted Access Platform
Products
GeoInt Platform E2E Encrypted AI Powered SAST
About UsBlogOur Services
OFFENSIVE SECURITYAutomotive Security TestingIoT & Firmware TestingUAV & Drone SecurityAPPLICATION SECURITYWeb & Mobile SecurityTrainingsLinux Usermode Exploitation 101
Contact Us
Intel Feed

Dispatches

Analysis, research, and operational insights from the HardenWall team.

All Blog CVEs Exploit Dev Exploits Free Reports FREEPAGES

Introducing Freepages: Build Secure Team Communities in Seconds

We’re excited to launch Freepages — a new platform for creating fully isolated communities with real-time chat, team management, and end-to-end encrypted messaging.

Read Brief
GEOINT

How AI-Powered Geolocation Is Transforming Search and Rescue Operations

Modern SAR teams are leveraging AI geolocation to analyze terrain photos in real time, cutting response times and improving mission outcomes in critical scenarios.

BLOG

Stack Overflows for Beginners — Level 5

Welcome again to the Stack Overflows for Beginners series! In this post, we continue with the Level 5 binary and work on exploiting it to get the next flag...

BLOG

Stack Overflows for Beginners — Level 4

Welcome again to the Stack Overflows for Beginners series! In this post, we continue with the Level 4 binary and work on exploiting it to get the next flag....

BLOG

Linux Usermode Exploitation 101

Introduction The aim of this course is to train students in the fundamentals of Linux usermode exploitation. You will learn how stack memory works, how...

BLOG

Stack Overflows for Beginners — Level 3

Welcome again to the Stack Overflows for Beginners series! In this post, we continue with the Level 3 binary and work on exploiting it to get the next flag....

BLOG

Stack Overflows for Beginners — Level 2

Welcome again to the Stack Overflows for Beginners series! In this post, we continue with the Level 2 binary and work on exploiting it to get the next flag....

BLOG

Stack Overflows for Beginners — Level 1

In this post, we’ll explore the fundamentals of exploiting stack-based buffer overflows using the “Stack Overflows for Beginners: 1.0.1” challenges from VulnHub. We’ll walk through analyzing...

FREE REPORTS

Analyzing BXAQ Spyware

The BXAQ (MobileHunter) application, used by authorities for surveillance purposes, poses significant privacy and security risks to users.

BLOG

Walkthrough: Config Editor app in Android

Affected Product Config Editor Affected version 1.0 CVE ID N/A Vulnerability Type Remote Code Execution Type MOBILEAPPS DescriptionCVE-2022-1471 identifies a critical unsafe deserialization vulnerability within...

Access from the European Union/UK is restricted

This system is not offered to EU, UK, or EEA users.

This system is a non-EU research prototype and is not offered to individuals or entities within the European Union, United Kingdom, or European Economic Area. No services are provided to users in these jurisdictions, and no personal data from EU/UK/EEA data subjects is intended to be processed.