Securing Internet of Things’ devices has been an ongoing struggle since the technology's recognition. Finding methods to prevent or counter those threats through the experience of the hackers themselves is a promising way of securing these devices. The approach described in this article uses that experience and transforms it into useful models and algorithms for IoT security.