Bosen's Playground
Name
Last modified
Size
Parent Directory
-
Adrian Wood & Mary Walker-Confused Learning Supply Chain Attacks through Machine Learning Models.pdf
2025-12-19 20:41
6.2M
Allyn Stott-The Fault in Our Metrics Rethinking How We Measure Detection & Response.pdf
2025-12-19 20:41
1.2M
Arun Kanuparthi & Hareesh Khattri & Jason Fung & Jeyavijayan JV Rajendran & Ahmad-Reza Sadeghi-The HackDAC Story Learnings from Organizing the World's Largest Hardware Hacking Competition.pdf
2025-12-19 20:41
2.8M
Bohan Liu & Haibin Shi-The Hole in Sandbox Escape Modern Web-Based App Sandbox From Site-Isolation Perspective.pdf
2025-12-19 20:41
2.7M
Chao Ma & Han Yan & Tim Xia-LinkDoor A Hidden Attack Surface in the Android Netlink Kernel Modules.pdf
2025-12-19 20:41
3.6M
Csaba Fitzl & Wojciech ReguĊa-The Final Chapter Unlimited ways to bypass your macOS privacy mechanisms.pdf
2025-12-19 20:41
11M
Daniel Bohannon _ Andi Ahmeti- Cloud Console Cartographer Tapping Into Mapping Slogging Thru Logging_compressed.pdf
2025-12-19 20:41
6.9M
Eyal Semel & Ron Semel & Alon Dankner & Sara Bitan & Eli Biham-Debug7 Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs.pdf
2025-12-19 20:41
5.9M
Greg Chen & Charles Li & Che Chang-Chinese APT A Master of Exploiting Edge Devices.pdf
2025-12-19 20:41
4.6M
Gyuyeon Kim _ Hyunho Cho-Operation PoisonedApple Tracing Credit Card Information Theft to Payment Fraud_compressed.pdf
2025-12-19 20:41
3.8M
Is not in this List.txt
2025-12-19 20:41
2.0K
Lewei Qu-Attacking Debug Modules In The Android Ecosystem.pdf
2025-12-19 20:41
2.4M
Le Wu & Qi Zhang-Game of Cross Cache Let's Win It in a More Effective Way.pdf
2025-12-19 20:41
4.0M
Luigino Camastra & Igor Morgenstern & Jan Vojtesek-From BYOVD to a 0-day Unveiling Advanced Exploits in Cyber Recruiting Scams.pdf
2025-12-19 20:41
2.0M
Matthias Frielingsdorf-You Shall Not PASS - Analysing a NSO iOS Spyware Sample.pdf
2025-12-19 20:41
19M
Nimish Mishra & Anirban Chakraborty & Debdeep Mukhopadhyay-Faults in Our Bus Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems.pdf
2025-12-19 20:41
1.9M
Nitesh Surana & David Fiser-Breaking Managed Identity Barriers In Azure Services.pdf
2025-12-19 20:41
19M
Or Yair-Magicdot A Hacker's Magic Show of Disappearing Dots and Spaces.pdf
2025-12-19 20:41
3.8M
Peng Zhou-How to Make Hugging Face to Hug Worms Discovering and Exploiting Unsafe Pickle.loads over Pre-Trained Large Model Hubs.pdf
2025-12-19 20:41
4.7M
Pukhraj Singh-China's Military Cyber Operations Has the Strategic Support Force Come of Age.pdf
2025-12-19 20:41
5.5M
Quan Jin & Yingqi Shi & Mingjia Liu & Siyuan Liu & Guoxian Zhong-A Glimpse Into The Protocol Fuzz Windows RDP Client For Fun And Profit.pdf
2025-12-19 20:41
4.9M
Rocky Bernstein-How to Get the Most Out of the Python Decompilers Uncompyle6 and Decompyle3 - How to Write and Read a Bytecode Decompiler.pdf
2025-12-19 20:41
5.0M
Sandro Pinto & Cristiano Rodrigues -What the TrustZone-M Doesn't See, the MCU Does Grieve Over Lessons Learned from Assessing a Microcontroller TEE.pdf
2025-12-19 20:41
7.8M
Shupeng Gao & Yingtao Zeng & Jie Gao & Yimi Hu-The Key to Remote Vehicle Control Autonomous Driving Domain Controller.pdf
2025-12-19 20:41
6.8M
Sojun Ryu & YeongJae Shin-Voice Phishing Syndicates Unmasked An In-Depth Investigation and Exposure.pdf
2025-12-19 20:41
13M
Song Liu & Zhechang Zhang & Hengkai Ye & Hong Hu - One Flip is All It Takes Identifying Syscall-Guard Variables for Data-Only Attacks.pdf
2025-12-19 20:41
4.5M
Takayuki Hatakeyama & Yuya Chudo-Bypassing Entra ID Conditional Access Like APT A Deep Dive Into Device Authentication Mechanisms for Building Your Own PRT Cookie.pdf
2025-12-19 20:41
2.6M
Tal Be'ery-Bad Randomness Protecting Against Cryptography's Perfect Crime.pdf
2025-12-19 20:41
11M
Tianze Ding-CertifiedDCOM The Privilege Escalation Journey to Domain Admin with DCOM.pdf
2025-12-19 20:41
3.8M
Tomer Bar & Shmuel Cohen-EDR Reloaded Erase Data Remotely.pdf
2025-12-19 20:41
5.0M
Tong Liu & Yuekang Li & Zizhuang Deng & Guozhu Meng & Kai Chen-LLM4Shell Discovering and Exploiting RCE Vulnerabilities in Real-World LLM-Integrated Frameworks and Apps.pdf
2025-12-19 20:41
5.4M
Victor V-Unveiling the Cracks in Virtualization, Mastering the Host System--VMware Workstation Escape.pdf
2025-12-19 20:41
2.1M
WeiMin Cheng & Yue Liu-SystemUI As EvilPiP The Hijacking Attacks on Modern Mobile Devices.pdf
2025-12-19 20:41
2.2M
Yuhao Jiang & Xinlei Ying-URB Excalibur The New VMware All-Platform VM Escapes.pdf
2025-12-19 20:41
4.9M
Zhengyang Zhou & Yiman He & Ning Wang & Xianlin Wu & Feifei Chen-Privacy Detective Sniffing Out Your Data Leaks for Android.pdf
2025-12-19 20:41
3.6M