A Proof-of-Concept demonstrating physical access exploitation and remote payload delivery, showcasing foundational knowledge in pentesting and IoT security.
In enterprise security, the physical perimeter is often the final line of defense. This project explores the intersection of Physical Access Exploitation and IoT-driven Command & Control (C2).
"I don't just learn theory; I build, break, and fix."