PoC exploits for network device vulnerabilities. Firmware analysis. Router configuration file decryption.