PoC exploits for network device vulnerabilities.

Firmware analysis.

Router configuration file decryption.