[ICO]NameLast modifiedSize
[parent]Parent Directory  -
[   ]Abu Shohel Ahmed & Tuomas Aura_Vulnerabilities in the eSIM download protocol.pdf2025-12-19 20:41 1.7M
[   ]Adrian Dabrowski & Gabriel Gegenhuber & Florian Holzbauer & Philipp E. Frenzel_WiFi Calling Revealing Downgrade Attacks and Not-so-private private Keys_Compressed.pdf2025-12-19 20:41 4.0M
[   ]Amir Zaltzman & Avishai Wool_From Pass-the-Hash to Code Execution on Schneider Electric M340 PLCs.pdf2025-12-19 20:41 7.8M
[   ]Amir Zaltzman & Avishai Wool_From Pass-the-Hash to Code Execution on Schneider Electric M340 PLCs_wp.pdf2025-12-19 20:41 477K
[   ]Amit Finkman & Avishag Shapira & Eden Bar Kochva & Asaf Shabtai & Yuval Elovici & Inbar Maimon & Dudu Mimran_CodeCloak A DRL-Based Method for Mitigating Code Leakage by LLM Code Assistants.pdf2025-12-19 20:41 3.1M
[   ]Ankur Sand & Syed Islam & Michael Davis & Joshua Tigges & Marty Grant & Rusty Clark_The CVSS Deception How We've Been Misled on Vulnerability Severity.pdf2025-12-19 20:41 4.6M
[   ]b2ahex & Yifen Ma & Greenbamboo C & Haotian Jiang_Heartbeat Havoc Unveiling Remote Vulnerabilities in Windows Network Load Balancing.pdf2025-12-19 20:41 4.9M
[   ]b2ahex & Yifen Ma & Greenbamboo C & Haotian Jiang_Heartbeat Havoc Unveiling Remote Vulnerabilities in Windows Network Load Balancing_wp.pdf2025-12-19 20:41 2.8M
[   ]Bela Genge & Ioan Padurean_Breaking Matter Vulnerabilities in the Matter Protocol_Compressed.pdf2025-12-19 20:41 12M
[   ]Bela Genge & Ioan Padurean_Breaking Matter Vulnerabilities in the Matter Protocol_wp.pdf2025-12-19 20:41 4.4M
[   ]Ben Nassi & Stav Cohen & Ron Bitton_The Double (AI) Agent Flipping a GenAI Agent Behavior from Serving an Application to Attacking it using Promptwares.pdf2025-12-19 20:41 3.8M
[   ]Csaba Fitzl_Apple Disk-O Party_Compressed.pdf2025-12-19 20:41 13M
[   ]Danila Parnishchev & Artem Ivachev & Mikhail Evdokimov & Aleksei Stennikov & Polina Smirnova & Radu Motspan_Over the Air Compromise of Modern Volkswagen Group Vehicles.pdf2025-12-19 20:41 5.2M
[text]David Klein_Parse Me, Baby, One More Time Bypassing HTML Sanitizer via Parsing Differentials-tool.txt2025-12-19 20:41 54
[   ]David Klein_Parse Me, Baby, One More Time Bypassing HTML Sanitizer via Parsing Differentials.pdf2025-12-19 20:41 17M
[   ]Dimitrios Valsamaras_My other ClassLoader is your ClassLoader Creating evil twin instances of a class.pdf2025-12-19 20:41 4.3M
[   ]Elias Heftrig & Niklas Vogel & Haya Schulmann & Michael Waidner_How the Internet Dodged a Bullet The KeyTrap Denial-of-Service Attacks against DNSSEC.pdf2025-12-19 20:41 4.2M
[   ]Frey Wilson_Redefining the Origin of Secrecy in a Post-Quantum World.pdf2025-12-19 20:41 2.3M
[   ]Henrik Ferdinand Nölscher_The Bugs in Your Bootloaders Embedded Device Secure Boot Fails and How to Fix Them.pdf2025-12-19 20:41 3.5M
[   ]Hyerean Jang & Youngjoo Shin & Taehun Kim_SysBumps Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon.pdf2025-12-19 20:41 5.4M
[text]is_not_in_this_list.txt2025-12-19 20:41 2.1K
[   ]Johann Rehberger_SpAIware & More Advanced Prompt Injection Exploits in LLM Applications.pdf2025-12-19 20:41 15M
[   ]Johann Rehberger_SpAIware & More Advanced Prompt Injection Exploits in LLM Applications_wp.pdf2025-12-19 20:41 4.0M
[   ]Jonathan Andersson & Thanos Kaliyanakis_Decoding EM-FI Attacks Lessons Learned from Glitching the GigaDevice GD32F407.pdf2025-12-19 20:41 6.0M
[   ]Junoh Lee & Gwangun Jung_Guest Revolution Chaining 3-bugs to compromise the Windows kernel from the VMware guest.pdf2025-12-19 20:41 5.3M
[   ]Kristina Balaam & Kyle Schmittle & Alemdar Islamoglu_Unmasking State-Sponsored Mobile Surveillance Malware from Russia, China, and North Korea – Threat Actors, Tactics, and Defense Strategies.pdf2025-12-19 20:41 6.5M
[   ]Miro Haller_Blast-RADIUS Breaking RADIUS, the de facto standard protocol for authentication, authorization, and accounting for networked devices.pdf2025-12-19 20:41 4.5M
[   ]Narayana Pappu & Rubens Zimbres_Mind the Data Gap Privacy Challenges in Autonomous AI Agents.pdf2025-12-19 20:41 1.3M
[   ]Nimrod Stoler & David Lazar_Is Your Memory Protected Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms.pdf2025-12-19 20:41 4.4M
[text]Nimrod Stoler & David Lazar_Is Your Memory Protected Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms_blog.txt2025-12-19 20:41 125
[   ]Noam Moshe & Tomer Goldschmidt_The Insecure IoT Cloud Strikes Again RCE on all Ruijie Cloud-Connected Devices.pdf2025-12-19 20:41 7.2M
[   ]Orange Tsai & Splitline Huang_WorstFit Unveiling Hidden Transformers in Windows ANSI.pdf2025-12-19 20:41 7.4M
[   ]Satoru Takekoshi & Manami Mori & Takaaki Fukai & Takahiro Shinagawa_AML Injection Attacks on Confidential VMs.pdf2025-12-19 20:41 8.3M
[   ]Scott Constable & Nagaraju Kodalapura & Baruch Chaikin_Improving Side-Channel Protections for Intel TDX.pdf2025-12-19 20:41 3.0M
[   ]Stanislav Dashevskyi & Francesco La Spina_When (Remote) Shells Fall Into The Same Hole Rooting DrayTek Routers Before Attackers Can Do It Again.pdf2025-12-19 20:41 3.5M
[   ]Stav shulman_UNC1860 and The Temple of Oats - Iran's hidden hand in Middle Eastern Networks.pdf2025-12-19 20:41 4.3M
[   ]Sung-Wook Jang & Yong-Hyun Kim_Operation MIDAS - Tracking Fraudulent Financial Program Organizations.pdf2025-12-19 20:41 16M
[   ]Ta-Lun Yen_Security analysis of Residential Gateways and ISPs global network domination is (sneakily) possible.pdf2025-12-19 20:41 5.9M
[   ]Tamás Vörös_LLMbotomy Shutting the Trojan Backdoors.pdf2025-12-19 20:41 2.4M
[   ]Yanzuo Chen & Zhibo Liu & Yuanyuan Yuan & Tianxiang Li & Sihang Hu & Zhihui Lin & Shuai Wang_The Devil is in the (Micro-) Architectures Uncovering New Side-Channel and Bit-Flip Attack Surfaces in DNN Ex.pdf2025-12-19 20:41 5.0M
[   ]Yuya Chudo_Unveiling the Power of Intune Leveraging Intune for Breaking Into Your Cloud and On-Premise.pdf2025-12-19 20:41 5.1M
[   ]Yvan Genuer_Exposing the dark corners of SAP 4-Years of Threat Intelligence data analyzed.pdf2025-12-19 20:41 5.6M
[   ]ZeSen Ye & Zhiniang Peng_Diving into Spooler Discovering LPE and RCE Vulnerabilities in Windows Printer Driver.pdf2025-12-19 20:41 2.3M
[   ]ZiYang Li & Ji'an Zhou & Ying Zhu_A Novel Attack Surface Java Authentication and Authorization Service (JAAS).pdf2025-12-19 20:41 19M