A logo featuring a stylized DNA strand with the text "Two-Six Tech" and "Technologies" beneath it.
Two Six Tech Logo
  • News
  • Products
      • Products Overview
        Learn More
    • Products Families
      • Pulse
      • Trusted Keep
      • IKE
    • Individual Products
      • SIGMA
      • Cipher SIM
  • Expertise
      • Expertise Overview
        Learn More
    • Expertise
      • DARPA R&D
      • Mobile Systems
      • High Assurance Solutions
      • Global Media Manipulation
      • Reverse Engineering
  • Resources
      • Resources Overview
        Learn More
    • Resources
      • Blog
      • Videos
      • White Papers
  • Careers
      • Careers Overview
        Learn More
    • Careers
      • Current Opportunities
      • Teams
      • Life at Two Six
      • Candidate Resources
      • Internship Program
  • About
      • Company Overview
        Lean More
    • About
      • Leadership
      • Contact Us
  • Products
    • Products Overview
    • Product Families
      • Pulse
      • Trusted Keep
      • IKE
    • Individual Products
      • SIGMA
      • Cipher SIM
  • Expertise
    • Expertise Overview
    • Expertise
      • DARPA R&D
      • Mobile Systems
      • High Assurance Solutions
      • Global Media Manipulation
      • Reverse Engineering
  • Resources
    • Resources Overview
    • Blog
    • Videos
  • News
  • Careers
    • Careers Overview
    • Current Opportunities
    • Teams
    • Life at Two Six
    • Candidate Resources
    • Internship Program
  • About
    • Company Overview
    • Leadership
    • Contact Us

Vulnerability Research

Jamming Untrusted Microelectronics white paper cover page
White Paper, Resources
JUMBLER - Jamming Untrusted Microelectronics BLE Reflexively
May 21, 2024
Hashashin Logo
Blog
Hashashin Update
February 21, 2024
Algorithmic data
Blog
Algorithmic Complexity Vulnerabilities: An Introduction
August 7, 2019
Vaultek
Blog
BlueSteal: Popping GATT Safes
December 6, 2017
Icons
Blog
It's Dangerous To Go Alone, Take This! - Tools Gathered from Recent CTF Travels
December 1, 2017
SQlite
Blog
SQLite as a Shell Script
November 4, 2016
Circuitboard
Blog
Breaking BHAD: Getting Local Root on the Belkin WeMo Switch
November 4, 2016
Bot red
Blog
Killing Mirai: Active defense against an IoT botnet (Part 1)
October 22, 2016
american fuzzy lop
Blog
Fuzzing nginx with American Fuzzy Lop (not the bunny)
August 12, 2016
black circuit
Blog
Running a Baremetal Beaglebone Black (Part 2)
August 5, 2016
A logo featuring a stylized DNA strand with the text "Two-Six Tech" and "Technologies" beneath it.
Contact Us
Products
  • Products Overview
    • -
      • Product Family
      • Pulse
      • Trusted Keep
      • IKE
    • -
      • Individual Products
      • SIGMA
      • Cipher SIM
Careers
  • Careers Overview
    • -
      • Current Opportunities
      • Teams
      • Life at Two Six
    • -
      • Candidate Resources
      • Internship Program
About
  • Company Overview
    • Leadership
    • Suppliers
Expertise
  • Expertise Overview
    • -
      • DARPA R&D
      • Mobile Systems
      • High Assurance Solutions
    • -
      • Global Media Manipulation
      • Reverse Engineering
Resources
  • Resources Overview
    • Blog
    • Videos
    • White Papers
News
  • News Overview

© Copyright 2025 Two Six Technologies

Sitemap | Privacy & Disclosures

Two-Six-Tech-Big-Logo@2x