VS-Labs
![VerSprite Finds Vulnerability in NETGEAR Nighthawk WiFi Router](https://versprite.com/wp-content/uploads/2021/06/Netgear-Nighthawk-2-1024x576.png)
Security Research
VerSprite Finds Vulnerability in NETGEAR Nighthawk WiFi Router
![Unpatched Security Vulnerability in OPTO 22 PAC Basic Software](https://versprite.com/wp-content/uploads/2021/04/OPTO-22-Security-1024x576.png)
Security Research
Unpatched Security Vulnerability in OPTO 22 PAC Basic Software
![Razer Synapse 3 Security Vulnerability Analysis Report](https://versprite.com/wp-content/uploads/2021/04/Razer-Synapse-1024x576.png)
Security Research
Razer Synapse 3 Security Vulnerability Analysis Report
![Windows Named Pipes Part 4: Taking a Trip Down Static Analysis Lane](https://versprite.com/wp-content/uploads/2021/02/Static-Analysis-1024x576.png)
Security Research
Windows Named Pipes Part 4: Taking a Trip Down Static Analysis Lane
![Part 3: Reversing & Exploiting Custom Windows Named Pipe Servers](https://versprite.com/wp-content/uploads/2020/10/Windows-Named-Pipe-1-1024x576.png)
Security Research
Part 3: Reversing & Exploiting Custom Windows Named Pipe Servers
![VerSprite Cyberwatch](https://versprite.com/wp-content/uploads/2020/08/Cyberwatch-3-1024x576.png)
Security Research
VerSprite Cyberwatch
![Reversing Stories: Updating the Undocumented ESTROBJ and STROBJ Structures for Windows 10 x64](https://versprite.com/wp-content/uploads/2020/04/Undocumented-Structures-1024x576.png)
Security Research
Reversing Stories: Updating the Undocumented ESTROBJ and STROBJ Structures for Windows 10 x64
![Investigating Microsoft Windows Vulnerability CVE-2019-1169](https://versprite.com/wp-content/uploads/2020/03/vulnerability-in-win32k.sys_-1024x576.png)
Security Research
Investigating Microsoft Windows Vulnerability CVE-2019-1169
![Automating CVE-2019-1436 Variant Analysis: An Intro to Detecting Information Leaks via IDAPython](https://versprite.com/wp-content/uploads/2020/03/IDAPython-1024x576.png)
Security Research
Automating CVE-2019-1436 Variant Analysis: An Intro to Detecting Information Leaks via IDAPython
![Part II: Analysis of a Vulnerable Microsoft Windows Named Pipe Application](https://versprite.com/wp-content/uploads/2019/12/vulnerable-named-pipe-server-1024x576.png)
Security Research
Part II: Analysis of a Vulnerable Microsoft Windows Named Pipe Application
![Part I: The Fundamentals of Windows Named Pipes](https://versprite.com/wp-content/uploads/2019/11/vulnerable-named-pipes-1024x576.png)
Security Research
Part I: The Fundamentals of Windows Named Pipes
![Analyzing CVE-2019-1436 on Windows 10 v1903](https://versprite.com/wp-content/uploads/2019/11/Windows-Information-Leak-1024x576.png)
Security Research
Analyzing CVE-2019-1436 on Windows 10 v1903
![Utilizing Reverse Proxies to Inject Malicious Code & Extract Sensitive Information](https://versprite.com/wp-content/uploads/2019/10/Reverse-Proxy-phishing-1024x576.png)
Application Security, Security Research
Utilizing Reverse Proxies to Inject Malicious Code & Extract Sensitive Information
![Waves Maxx Audio DLL Side-Loading LPE via Windows Registry](https://versprite.com/wp-content/uploads/2019/07/Windows-Registry-1024x576.png)
Application Security, Security Research
Waves Maxx Audio DLL Side-Loading LPE via Windows Registry
![Digging up the Past: OS X File Versioning](https://versprite.com/wp-content/uploads/2019/06/mac-os-x-1024x576.png)
Digital Forensics & Incident Response, Security Research