[ICO]NameLast modifiedSize
[parent]Parent Directory  -
[   ]Adrian Wood & Mary Walker-Confused Learning Supply Chain Attacks through Machine Learning Models.pdf2025-12-19 20:41 6.2M
[   ]Allyn Stott-The Fault in Our Metrics Rethinking How We Measure Detection & Response.pdf2025-12-19 20:41 1.2M
[   ]Arun Kanuparthi & Hareesh Khattri & Jason Fung & Jeyavijayan JV Rajendran & Ahmad-Reza Sadeghi-The HackDAC Story Learnings from Organizing the World's Largest Hardware Hacking Competition.pdf2025-12-19 20:41 2.8M
[   ]Bohan Liu & Haibin Shi-The Hole in Sandbox Escape Modern Web-Based App Sandbox From Site-Isolation Perspective.pdf2025-12-19 20:41 2.7M
[   ]Chao Ma & Han Yan & Tim Xia-LinkDoor A Hidden Attack Surface in the Android Netlink Kernel Modules.pdf2025-12-19 20:41 3.6M
[   ]Csaba Fitzl & Wojciech ReguĊ‚a-The Final Chapter Unlimited ways to bypass your macOS privacy mechanisms.pdf2025-12-19 20:41 11M
[   ]Daniel Bohannon _ Andi Ahmeti- Cloud Console Cartographer Tapping Into Mapping Slogging Thru Logging_compressed.pdf2025-12-19 20:41 6.9M
[   ]Eyal Semel & Ron Semel & Alon Dankner & Sara Bitan & Eli Biham-Debug7 Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs.pdf2025-12-19 20:41 5.9M
[   ]Greg Chen & Charles Li & Che Chang-Chinese APT A Master of Exploiting Edge Devices.pdf2025-12-19 20:41 4.6M
[   ]Gyuyeon Kim _ Hyunho Cho-Operation PoisonedApple Tracing Credit Card Information Theft to Payment Fraud_compressed.pdf2025-12-19 20:41 3.8M
[text]Is not in this List.txt2025-12-19 20:41 2.0K
[   ]Lewei Qu-Attacking Debug Modules In The Android Ecosystem.pdf2025-12-19 20:41 2.4M
[   ]Le Wu & Qi Zhang-Game of Cross Cache Let's Win It in a More Effective Way.pdf2025-12-19 20:41 4.0M
[   ]Luigino Camastra & Igor Morgenstern & Jan Vojtesek-From BYOVD to a 0-day Unveiling Advanced Exploits in Cyber Recruiting Scams.pdf2025-12-19 20:41 2.0M
[   ]Matthias Frielingsdorf-You Shall Not PASS - Analysing a NSO iOS Spyware Sample.pdf2025-12-19 20:41 19M
[   ]Nimish Mishra & Anirban Chakraborty & Debdeep Mukhopadhyay-Faults in Our Bus Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems.pdf2025-12-19 20:41 1.9M
[   ]Nitesh Surana & David Fiser-Breaking Managed Identity Barriers In Azure Services.pdf2025-12-19 20:41 19M
[   ]Or Yair-Magicdot A Hacker's Magic Show of Disappearing Dots and Spaces.pdf2025-12-19 20:41 3.8M
[   ]Peng Zhou-How to Make Hugging Face to Hug Worms Discovering and Exploiting Unsafe Pickle.loads over Pre-Trained Large Model Hubs.pdf2025-12-19 20:41 4.7M
[   ]Pukhraj Singh-China's Military Cyber Operations Has the Strategic Support Force Come of Age.pdf2025-12-19 20:41 5.5M
[   ]Quan Jin & Yingqi Shi & Mingjia Liu & Siyuan Liu & Guoxian Zhong-A Glimpse Into The Protocol Fuzz Windows RDP Client For Fun And Profit.pdf2025-12-19 20:41 4.9M
[   ]Rocky Bernstein-How to Get the Most Out of the Python Decompilers Uncompyle6 and Decompyle3 - How to Write and Read a Bytecode Decompiler.pdf2025-12-19 20:41 5.0M
[   ]Sandro Pinto & Cristiano Rodrigues -What the TrustZone-M Doesn't See, the MCU Does Grieve Over Lessons Learned from Assessing a Microcontroller TEE.pdf2025-12-19 20:41 7.8M
[   ]Shupeng Gao & Yingtao Zeng & Jie Gao & Yimi Hu-The Key to Remote Vehicle Control Autonomous Driving Domain Controller.pdf2025-12-19 20:41 6.8M
[   ]Sojun Ryu & YeongJae Shin-Voice Phishing Syndicates Unmasked An In-Depth Investigation and Exposure.pdf2025-12-19 20:41 13M
[   ]Song Liu & Zhechang Zhang & Hengkai Ye & Hong Hu - One Flip is All It Takes Identifying Syscall-Guard Variables for Data-Only Attacks.pdf2025-12-19 20:41 4.5M
[   ]Takayuki Hatakeyama & Yuya Chudo-Bypassing Entra ID Conditional Access Like APT A Deep Dive Into Device Authentication Mechanisms for Building Your Own PRT Cookie.pdf2025-12-19 20:41 2.6M
[   ]Tal Be'ery-Bad Randomness Protecting Against Cryptography's Perfect Crime.pdf2025-12-19 20:41 11M
[   ]Tianze Ding-CertifiedDCOM The Privilege Escalation Journey to Domain Admin with DCOM.pdf2025-12-19 20:41 3.8M
[   ]Tomer Bar & Shmuel Cohen-EDR Reloaded Erase Data Remotely.pdf2025-12-19 20:41 5.0M
[   ]Tong Liu & Yuekang Li & Zizhuang Deng & Guozhu Meng & Kai Chen-LLM4Shell Discovering and Exploiting RCE Vulnerabilities in Real-World LLM-Integrated Frameworks and Apps.pdf2025-12-19 20:41 5.4M
[   ]Victor V-Unveiling the Cracks in Virtualization, Mastering the Host System--VMware Workstation Escape.pdf2025-12-19 20:41 2.1M
[   ]WeiMin Cheng & Yue Liu-SystemUI As EvilPiP The Hijacking Attacks on Modern Mobile Devices.pdf2025-12-19 20:41 2.2M
[   ]Yuhao Jiang & Xinlei Ying-URB Excalibur The New VMware All-Platform VM Escapes.pdf2025-12-19 20:41 4.9M
[   ]Zhengyang Zhou & Yiman He & Ning Wang & Xianlin Wu & Feifei Chen-Privacy Detective Sniffing Out Your Data Leaks for Android.pdf2025-12-19 20:41 3.6M