About
Hello there, I am Tanmay Sharma, a passionate cybersecurity agent. (more)
Latest Posts
FirmXRay
link : https://github.com/OSUSecLab/FirmXRay
A static analysis tool based on Ghidra to detect Bluetooth link layer vulnerabilities from bare-metal firmware. As proof-of-concept, the current implementation supports firmware (ARM Cortex-M Architecture) developed based on Nordic and TI SDKs (i.e., SoftDevice and BLE-Stack).
The three main components of FirmXRay are:
- Base address recognition. It can automatically infer the firmware base address using the point-to relation heuristics. The output result will be in ./base/base.txt.
- Backward slicing. FirmXRay will start from the SDK APIs and backward extract the relevant program paths.
- Static value computation. FirmXRay can statically execute ARM instructions to compute the configuration values from the program slices.
For more details, please refer to our paper FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware.
The Journey Begins: Why I Built a SIEM Home Lab
Like many aspiring cybersecurity professionals, I wanted to get hands-on experience with real security tools. Reading about SIEMs is one thing, but actually building one? That’s where the real learning happens. So I rolled up my sleeves and dove into Microsoft Azure Sentinel to create my own Security Operations Center (SOC) in the cloud.
Spoiler alert: It was easier than I thought, but way more powerful than I imagined.
Latest Photos


