![[ICO]](data:,) | Name | Last modified | Size |
![[parent]](data:,) | Parent Directory | | - |
![[ ]](data:,) | Abu Shohel Ahmed & Tuomas Aura_Vulnerabilities in the eSIM download protocol.pdf | 2025-12-19 20:41 | 1.7M |
![[ ]](data:,) | Adrian Dabrowski & Gabriel Gegenhuber & Florian Holzbauer & Philipp E. Frenzel_WiFi Calling Revealing Downgrade Attacks and Not-so-private private Keys_Compressed.pdf | 2025-12-19 20:41 | 4.0M |
![[ ]](data:,) | Amir Zaltzman & Avishai Wool_From Pass-the-Hash to Code Execution on Schneider Electric M340 PLCs.pdf | 2025-12-19 20:41 | 7.8M |
![[ ]](data:,) | Amir Zaltzman & Avishai Wool_From Pass-the-Hash to Code Execution on Schneider Electric M340 PLCs_wp.pdf | 2025-12-19 20:41 | 477K |
![[ ]](data:,) | Amit Finkman & Avishag Shapira & Eden Bar Kochva & Asaf Shabtai & Yuval Elovici & Inbar Maimon & Dudu Mimran_CodeCloak A DRL-Based Method for Mitigating Code Leakage by LLM Code Assistants.pdf | 2025-12-19 20:41 | 3.1M |
![[ ]](data:,) | Ankur Sand & Syed Islam & Michael Davis & Joshua Tigges & Marty Grant & Rusty Clark_The CVSS Deception How We've Been Misled on Vulnerability Severity.pdf | 2025-12-19 20:41 | 4.6M |
![[ ]](data:,) | b2ahex & Yifen Ma & Greenbamboo C & Haotian Jiang_Heartbeat Havoc Unveiling Remote Vulnerabilities in Windows Network Load Balancing.pdf | 2025-12-19 20:41 | 4.9M |
![[ ]](data:,) | b2ahex & Yifen Ma & Greenbamboo C & Haotian Jiang_Heartbeat Havoc Unveiling Remote Vulnerabilities in Windows Network Load Balancing_wp.pdf | 2025-12-19 20:41 | 2.8M |
![[ ]](data:,) | Bela Genge & Ioan Padurean_Breaking Matter Vulnerabilities in the Matter Protocol_Compressed.pdf | 2025-12-19 20:41 | 12M |
![[ ]](data:,) | Bela Genge & Ioan Padurean_Breaking Matter Vulnerabilities in the Matter Protocol_wp.pdf | 2025-12-19 20:41 | 4.4M |
![[ ]](data:,) | Ben Nassi & Stav Cohen & Ron Bitton_The Double (AI) Agent Flipping a GenAI Agent Behavior from Serving an Application to Attacking it using Promptwares.pdf | 2025-12-19 20:41 | 3.8M |
![[ ]](data:,) | Csaba Fitzl_Apple Disk-O Party_Compressed.pdf | 2025-12-19 20:41 | 13M |
![[ ]](data:,) | Danila Parnishchev & Artem Ivachev & Mikhail Evdokimov & Aleksei Stennikov & Polina Smirnova & Radu Motspan_Over the Air Compromise of Modern Volkswagen Group Vehicles.pdf | 2025-12-19 20:41 | 5.2M |
![[text]](data:,) | David Klein_Parse Me, Baby, One More Time Bypassing HTML Sanitizer via Parsing Differentials-tool.txt | 2025-12-19 20:41 | 54 |
![[ ]](data:,) | David Klein_Parse Me, Baby, One More Time Bypassing HTML Sanitizer via Parsing Differentials.pdf | 2025-12-19 20:41 | 17M |
![[ ]](data:,) | Dimitrios Valsamaras_My other ClassLoader is your ClassLoader Creating evil twin instances of a class.pdf | 2025-12-19 20:41 | 4.3M |
![[ ]](data:,) | Elias Heftrig & Niklas Vogel & Haya Schulmann & Michael Waidner_How the Internet Dodged a Bullet The KeyTrap Denial-of-Service Attacks against DNSSEC.pdf | 2025-12-19 20:41 | 4.2M |
![[ ]](data:,) | Frey Wilson_Redefining the Origin of Secrecy in a Post-Quantum World.pdf | 2025-12-19 20:41 | 2.3M |
![[ ]](data:,) | Henrik Ferdinand Nölscher_The Bugs in Your Bootloaders Embedded Device Secure Boot Fails and How to Fix Them.pdf | 2025-12-19 20:41 | 3.5M |
![[ ]](data:,) | Hyerean Jang & Youngjoo Shin & Taehun Kim_SysBumps Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon.pdf | 2025-12-19 20:41 | 5.4M |
![[text]](data:,) | is_not_in_this_list.txt | 2025-12-19 20:41 | 2.1K |
![[ ]](data:,) | Johann Rehberger_SpAIware & More Advanced Prompt Injection Exploits in LLM Applications.pdf | 2025-12-19 20:41 | 15M |
![[ ]](data:,) | Johann Rehberger_SpAIware & More Advanced Prompt Injection Exploits in LLM Applications_wp.pdf | 2025-12-19 20:41 | 4.0M |
![[ ]](data:,) | Jonathan Andersson & Thanos Kaliyanakis_Decoding EM-FI Attacks Lessons Learned from Glitching the GigaDevice GD32F407.pdf | 2025-12-19 20:41 | 6.0M |
![[ ]](data:,) | Junoh Lee & Gwangun Jung_Guest Revolution Chaining 3-bugs to compromise the Windows kernel from the VMware guest.pdf | 2025-12-19 20:41 | 5.3M |
![[ ]](data:,) | Kristina Balaam & Kyle Schmittle & Alemdar Islamoglu_Unmasking State-Sponsored Mobile Surveillance Malware from Russia, China, and North Korea – Threat Actors, Tactics, and Defense Strategies.pdf | 2025-12-19 20:41 | 6.5M |
![[ ]](data:,) | Miro Haller_Blast-RADIUS Breaking RADIUS, the de facto standard protocol for authentication, authorization, and accounting for networked devices.pdf | 2025-12-19 20:41 | 4.5M |
![[ ]](data:,) | Narayana Pappu & Rubens Zimbres_Mind the Data Gap Privacy Challenges in Autonomous AI Agents.pdf | 2025-12-19 20:41 | 1.3M |
![[ ]](data:,) | Nimrod Stoler & David Lazar_Is Your Memory Protected Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms.pdf | 2025-12-19 20:41 | 4.4M |
![[text]](data:,) | Nimrod Stoler & David Lazar_Is Your Memory Protected Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms_blog.txt | 2025-12-19 20:41 | 125 |
![[ ]](data:,) | Noam Moshe & Tomer Goldschmidt_The Insecure IoT Cloud Strikes Again RCE on all Ruijie Cloud-Connected Devices.pdf | 2025-12-19 20:41 | 7.2M |
![[ ]](data:,) | Orange Tsai & Splitline Huang_WorstFit Unveiling Hidden Transformers in Windows ANSI.pdf | 2025-12-19 20:41 | 7.4M |
![[ ]](data:,) | Satoru Takekoshi & Manami Mori & Takaaki Fukai & Takahiro Shinagawa_AML Injection Attacks on Confidential VMs.pdf | 2025-12-19 20:41 | 8.3M |
![[ ]](data:,) | Scott Constable & Nagaraju Kodalapura & Baruch Chaikin_Improving Side-Channel Protections for Intel TDX.pdf | 2025-12-19 20:41 | 3.0M |
![[ ]](data:,) | Stanislav Dashevskyi & Francesco La Spina_When (Remote) Shells Fall Into The Same Hole Rooting DrayTek Routers Before Attackers Can Do It Again.pdf | 2025-12-19 20:41 | 3.5M |
![[ ]](data:,) | Stav shulman_UNC1860 and The Temple of Oats - Iran's hidden hand in Middle Eastern Networks.pdf | 2025-12-19 20:41 | 4.3M |
![[ ]](data:,) | Sung-Wook Jang & Yong-Hyun Kim_Operation MIDAS - Tracking Fraudulent Financial Program Organizations.pdf | 2025-12-19 20:41 | 16M |
![[ ]](data:,) | Ta-Lun Yen_Security analysis of Residential Gateways and ISPs global network domination is (sneakily) possible.pdf | 2025-12-19 20:41 | 5.9M |
![[ ]](data:,) | Tamás Vörös_LLMbotomy Shutting the Trojan Backdoors.pdf | 2025-12-19 20:41 | 2.4M |
![[ ]](data:,) | Yanzuo Chen & Zhibo Liu & Yuanyuan Yuan & Tianxiang Li & Sihang Hu & Zhihui Lin & Shuai Wang_The Devil is in the (Micro-) Architectures Uncovering New Side-Channel and Bit-Flip Attack Surfaces in DNN Ex.pdf | 2025-12-19 20:41 | 5.0M |
![[ ]](data:,) | Yuya Chudo_Unveiling the Power of Intune Leveraging Intune for Breaking Into Your Cloud and On-Premise.pdf | 2025-12-19 20:41 | 5.1M |
![[ ]](data:,) | Yvan Genuer_Exposing the dark corners of SAP 4-Years of Threat Intelligence data analyzed.pdf | 2025-12-19 20:41 | 5.6M |
![[ ]](data:,) | ZeSen Ye & Zhiniang Peng_Diving into Spooler Discovering LPE and RCE Vulnerabilities in Windows Printer Driver.pdf | 2025-12-19 20:41 | 2.3M |
![[ ]](data:,) | ZiYang Li & Ji'an Zhou & Ying Zhu_A Novel Attack Surface Java Authentication and Authorization Service (JAAS).pdf | 2025-12-19 20:41 | 19M |