IoT Security Researcher | Hardware Breaker | Community Builder | Building Opensource IoT Security
Founder of IoTSRG | Since 2017 | Uplifting the IoT hacking underground
I'm Mr-IoT - turning zero-clicks into open-source arsenals. I've been breaking, building, and securing embedded tech while fueling the rise of research through IoTSRG.
| Project | Year | Track | Description |
|---|---|---|---|
| Akhanda-OS | 2026 | Active | Embedded hacking OS / security platform |
| RFSploit | 2026 | Active | RF exploitation toolkit (SDR, signals, protocol attacks) |
| BlueSploit | 2026 | Active | Bluetooth exploitation toolkit |
| HARDAX | 2026 | Active | Hardening Audit eXaminer for Android OS-based IoT devices |
| HardenCheck | 2026 | Active | Firmware hardening and security posture checker |
| ICE-Bite | 2024 | Active | Hardware probing toolkit |
| CommandInWiFi | 2024 | Active | Covert command channel via WiFi |
| IoT-PT OSv1 | 2020 | Legacy | A custom OS for IoT pentesting |
| Conference | Location | Topic | Role | Year |
|---|---|---|---|---|
| miniorange | Pune, India | Bluetooth Hacking Workshop | Workshop | 2026 |
| Seasides | Goa, India | Advanced HW + BLE Exploitation | Workshop | 2025 |
| BSides Kerala | Kerala, India | IoT Bug Discovery and Exploitation | Workshop | 2025 |
| BSides Dehradun | Dehradun, India | Keynote | Keynote | 2024 |
| c0c0n | Cochin, India | IoT Security Village | Village Lead | 2023 |
| OWASP Seasides | Goa, India | BLE UAE | Talk | 2020 |
| p0scon | Tehran, Iran | 433MHz Exploitation | Talk | 2019 |
| null Bangalore | Bangalore, India | IoT Exploitation | Training | 2016 |
| Cysinfo | Bangalore, India | IoT Attacks | Talk | 2016 |
| Title | Year | Published In |
|---|---|---|
| Hacking the IoT: A Pentester's OS | 2020 | Hakin9 |
| Hunting IoT Devices with NetHunter Pt.1 | 2019 | Hakin9 |
| IoT Security Essentials 101 | 2017 | Pentest Magazine |
- Embedded Systems and Firmware Reversing
- Fault Injection and Glitch Attacks (Power/Clock/EMFI)
- Bluetooth Low Energy Hacking (BLE UAE, Braktooth, Sweyntooth)
- Radio Protocol Reverse Engineering (433MHz, Zigbee, Sub-GHz)
- Secure Boot Bypass via Hardware Attacks
- Hardware Debug Interfaces (UART/SWD/JTAG)
- WiFi Exploitation and Covert Channels
If you're a hacker, conference organizer, community builder, hardware vendor, or FOSS believer, lets build something disruptive together. I'm open for research collabs, village setups, training sessions, or tool drops.
"In a world of closed devices, open-source is rebellion."
Mr-IoT




