[ICO]NameLast modifiedSize
[parent]Parent Directory  -
[   ]Ali Ahmed & Brian Lee & Amit Deokar_Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs.pdf2025-12-19 20:40 1.1M
[   ]Andy Ellis & Meghan Jacquot & Aastha Sahni & Sherri Davidoff_Diversity Microtalks Perspectives on Creating Change.pdf2025-12-19 20:40 2.7M
[   ]Biao He & Haowen Mu & Yu Ouyang_ODDFuzz Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing.pdf2025-12-19 20:40 6.2M
[   ]Bob Lord & Jack Cable_Unsafe At Any Speed CISA's Plan to Foster Tech Ecosystem Security.pdf2025-12-19 20:40 7.3M
[   ]Carlo Meijer & Wouter Bokslag & Jos Wetzels_All Cops Are Broadcasting Breaking TETRA After Decades in the Shadows.pdf2025-12-19 20:40 5.8M
[   ]Catherine Lyle_Why Cyber Insurance Should be Your SOC's New Best Friend.pdf2025-12-19 20:40 1.4M
[   ]Cat Self & Kate Esprit_Becoming a Dark Knight Adversary Emulation Demonstration for ATT&CK Evaluations.pdf2025-12-19 20:40 5.7M
[text]Christian Werling & Niclas Kühnapfel & Hans Niklas Jacob & Oleg Drokin_Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater_tools.txt2025-12-19 20:40 29
[   ]Christian Werling _ Niclas Kühnapfel _ Hans Niklas Jacob _ Oleg Drokin_Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater.pdf2025-12-19 20:40 3.8M
[   ]Christopher Wade_Physical Attacks Against Smartphones.pdf2025-12-19 20:40 2.1M
[   ]Colin O'Flynn_Oven Repair (The Hardware Hacking Way).pdf2025-12-19 20:40 14M
[   ]Daniel Cooper & Mike Hintze & Leslie Katz & Adam Shostack _Hot Topics in Cyber and Privacy Regulation.pdf2025-12-19 20:40 733K
[   ]Daniel dos Santos & Simon Guiot & Stanislav Dashevskyi & Amine Amri & Oussama Kerro_Route to Bugs Analyzing the Security of BGP Message Parsing.pdf2025-12-19 20:40 2.3M
[   ]Daniel Jary_From Dead Data to Digestion Extracting Windows Fibers for Your Digital Forensics Diet.pdf2025-12-19 20:40 1.6M
[text]Daniel Moghimi_Single Instruction Multiple Data Leaks in Cutting-edge CPUs, AKA Downfall.txt2025-12-19 20:40 22
[   ]Daniel Woods_Lemons and Liability Cyber Warranties as an Experiment in Software Regulation.pdf2025-12-19 20:40 1.7M
[   ]Daniel Woods_Lemons and Liability Cyber Warranties as an Experiment in Software Regulation_wp.pdf2025-12-19 20:40 229K
[   ]Dan Petro & David Vargas _ Badge of Shame Breaking into Secure Facilities with OSDP.pdf2025-12-19 20:40 12M
[   ]David Renardy & Zach Miller_Know Thy Enemy The Taxonomies That Meta Uses to Map the Offensive Privacy Space.pdf2025-12-19 20:40 1.5M
[   ]Din Serussi_Evasive Maneuvers Trends in Phishing Evasion & Anti-Evasion.pdf2025-12-19 20:40 4.7M
[   ]Duy Hieu Nguyen,Anh Khoa Nguyen,Huu Giap Nguyen,Thanh Nguyen,Anh Quynh Nguyen_TSSHOCK Breaking MPC Wallets and Digital Custodians for $BILLION$ Profit.pdf2025-12-19 20:40 1.2M
[   ]Duy Hieu Nguyen,Anh Khoa Nguyen,Huu Giap Nguyen,Thanh Nguyen,Anh Quynh Nguyen_TSSHOCK Breaking MPC Wallets and Digital Custodians for $BILLION$ Profit_wp.pdf2025-12-19 20:40 425K
[   ]Erik Decker_Leverage and Demonstrate Value with your Cyber Insurance Renewal.pdf2025-12-19 20:40 664K
[   ]Fan Wu & Xuankai Zhang_Endoscope Unpacking Android Apps with VM-Based Obfuscation.pdf2025-12-19 20:40 4.1M
[   ]Farzan Karimi & Xuan Xing & Xiling Gong & Eugene Rodionov_Over the Air, Under the Radar Attacking and Securing the Pixel Modem.pdf2025-12-19 20:40 2.4M
[   ]Fredrik Heiding & Bruce Schneier & Arun Vishwanath & Jeremy Bernstein _ Devising and Detecting Phishing Large Language Models (GPT3, GPT4) vs. Smaller Human Models (V-Triad, Generic Emails).pdf2025-12-19 20:40 2.4M
[   ]Fredrik Heiding & Bruce Schneier & Arun Vishwanath & Jeremy Bernstein _ Devising and Detecting Phishing Large Language Models (GPT3, GPT4) vs. Smaller Human Models (V-Triad, Generic Emails)_WP.pdf2025-12-19 20:40 13M
[   ]Guanxing Wen_Core Escalation Unleashing the Power of Cross-Core Attacks on Heterogeneous System.pdf2025-12-19 20:40 23M
[   ]Haiquan Zhang & Rhettxie Rhettxie_CodeQL Also a Powerful Binary Analysis Engine.pdf2025-12-19 20:40 8.8M
[   ]Hillai Ben-Sasson_BingBang Hacking Bing.com (and much more) with Azure Active Directory.pdf2025-12-19 20:40 9.8M
[   ]James Kettle_Smashing the State Machine The True Potential of Web Race Conditions.pdf2025-12-19 20:40 2.4M
[   ]James Kettle_Smashing the State Machine The True Potential of Web Race Conditions_wp.pdf2025-12-19 20:40 793K
[   ]Jeremy Long_Reflections on Trust in the Software Supply Chain.pdf2025-12-19 20:40 7.2M
[   ]Johannes Willbold_Houston, We Have a Problem Analyzing the Security of Low Earth Orbit Satellites.pdf2025-12-19 20:40 2.7M
[   ]John Caruthers_Bridging Cyber and Insurance.pdf2025-12-19 20:40 8.2M
[   ]John Miller & Ron Graf_What Does an LLM-Powered Threat Intelligence Program Look Like.pdf2025-12-19 20:40 2.1M
[   ]John Swanson_I Was Tasked With Enrolling Millions of Developers in 2FA - Here's What Happened.pdf2025-12-19 20:40 7.0M
[   ]Jonathan Birch_Second Breakfast Implicit and Mutation-Based Serialization Vulnerabilities in dotNET.pdf2025-12-19 20:40 1.0M
[   ]Jonathan Birch_Second Breakfast Implicit and Mutation-Based Serialization Vulnerabilities in dotNET_wp.pdf2025-12-19 20:40 265K
[   ]Joseph Tartaro & Enrique Nissim & Ethan Shackelford_Shuffle Up and Deal Analyzing the Security of Automated Card Shufflers.pdf2025-12-19 20:40 4.3M
[   ]Joseph Tartaro & Enrique Nissim & Ethan Shackelford_Shuffle Up and Deal Analyzing the Security of Automated Card Shufflers_wp.pdf2025-12-19 20:40 4.7M
[   ]Kai Greshake & Christoph Endres & Mario Fritz & Shailesh Mishra & Sahar Abdelnabi_Compromising LLMs The Advent of AI Malware.pdf2025-12-19 20:40 4.0M
[   ]Kai Greshake & Christoph Endres & Mario Fritz & Shailesh Mishra & Sahar Abdelnabi_Compromising LLMs The Advent of AI Malware_wp.pdf2025-12-19 20:40 7.0M
[   ]Kaileigh McCrea_The Yandex Leak How a Russian Search Giant Uses Consumer Data.pdf2025-12-19 20:40 5.8M
[   ]Kelly Shortridge_Fast, Ever-Evolving Defenders The Resilience Revolution.pdf2025-12-19 20:40 24M
[   ]Kirsten Bay_The Integration Cyber Security and Insurance The Journey of Cysurance.pdf2025-12-19 20:40 2.7M
[   ]Marco Squarcina & Pedro Adão_Cookie Crumbles Unveiling Web Session Integrity Vulnerabilities.pdf2025-12-19 20:40 3.2M
[   ]Margaret Zimmermann_When a Zero Day and Access Keys Collide in the Cloud Responding to the SugarCRM 0-Day Vulnerability.pdf2025-12-19 20:40 1.3M
[text]Margaret Zimmermann_When a Zero Day and Access Keys Collide in the Cloud Responding to the SugarCRM 0-Day Vulnerability.txt2025-12-19 20:40 92
[   ]Michael Bargury_All You Need is Guest.pdf2025-12-19 20:41 14M
[   ]Michael Kouremetis & Ron Alford & Dean Lawrence_Mirage Cyber Deception Against Autonomous Cyber Attacks.pdf2025-12-19 20:41 5.0M
[   ]Michael Stepankin_mTLS When Certificate Authentication is Done Wrong.pdf2025-12-19 20:41 1.3M
[   ]Moritz Abrell_Zero-Touch-Pwn Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones.pdf2025-12-19 20:41 19M
[   ]MoustachedBouncer AitM-Powered Surveillance via Belarus ISPs.pdf2025-12-19 20:41 5.0M
[   ]Mrityunjay Gautam & Pavan Kolachoor_AI Assisted Decision Making of Security Review Needs for New Features.pdf2025-12-19 20:41 2.8M
[   ]Nan Wang & Zhenghang Xiao_The Hat Trick Exploit Chrome Twice from Runtime to JIT.pdf2025-12-19 20:41 6.0M
[   ]Nan Wang & Zhenghang Xiao_The Hat Trick Exploit Chrome Twice from Runtime to JIT_wp.pdf2025-12-19 20:41 2.4M
[   ]Nicholas Dubois & Jessica Hyde_nput Output + Syslog (iO+S) Obtaining Data From Locked iOS Devices via Live Monitoring.pdf2025-12-19 20:41 4.7M
[   ]Nick Frichette_Evading Logging in the Cloud Bypassing AWS CloudTrail.pdf2025-12-19 20:41 2.4M
[   ]Nick Merker & Stephen Reynolds_Protecting the CISO A Legal Journey.pdf2025-12-19 20:41 1.9M
[   ]Nikolaos Makriyannis & Oren Yomtov & Arik Galansky_Small Leaks, Billions Of Dollars Practical Cryptographic Exploits That Undermine Leading Crypto Wallets.pdf2025-12-19 20:41 4.3M
[   ]Nitesh Surana & Magno Logan & David Fiser_Uncovering Azure's Silent Threats A Journey into Cloud Vulnerabilities.pdf2025-12-19 20:41 4.5M
[   ]Noam Moshe & Sharon Brizinov _ A Pain in the NAS Exploiting Cloud Connectivity to PWN Your NAS.pdf2025-12-19 20:41 7.0M
[text]NOT_IN_LIST.txt2025-12-19 20:41 3.7K
[   ]Olivier Bilodeau & Andréanne Bergeron_I Watched You Roll the Die Unparalleled RDP Monitoring Reveal Attackers' Tradecraft.pdf2025-12-19 20:41 9.2M
[   ]Or Yair_One Drive, Double Agent Clouded OneDrive Turns Sides.pdf2025-12-19 20:41 5.2M
[   ]Pankaj Moolrajani_Identifying and Reducing Permission Explosion in AWS A Graph-Based and Analytical Approach.pdf2025-12-19 20:41 3.8M
[   ]Rita Doerr _ Making and Breaking NSA's Codebreaker Challenge.pdf2025-12-19 20:41 704K
[   ]Ruben Boonen & Valentina Palmiotti_Close Encounters of the Advanced Persistent Kind Leveraging Rootkits for Post-Exploitation.pdf2025-12-19 20:41 15M
[   ]Ruben Santamarta_Seeing Through the Invisible Radiation Spikes Detected in Chernobyl During the Russian Invasion Show Possible Evidence of Fabrication.pdf2025-12-19 20:41 6.1M
[   ]Seunghun Han _Lost Control Breaking Hardware-Assisted Kernel Control-Flow Integrity with Page-Oriented Programming.pdf2025-12-19 20:41 13M
[   ]Sharon Brizinov & Noam Moshe_Exploiting OPC-UA in Every Possible Way Practical Attacks Against Modern OPC-UA Architectures.pdf2025-12-19 20:41 12M
[   ]Sian-Yao Huang & Cheng-Lin Yang & Chung-Kuan Chen_IRonMAN InterpRetable Incident Inspector Based ON Large-Scale Language Model and Association miNing.pdf2025-12-19 20:41 3.2M
[   ]Stiv Kupchik_Lifting the Fog of War - Monitoring, Identifying and Mitigating MS-RPC Based Threats.pdf2025-12-19 20:41 1.6M
[   ]STOK_Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare.pdf2025-12-19 20:41 25M
[   ]Tiffany Rad & Austin Shamlin_ Civil Cyber Defense Use Your Resources to Defend Non-Profits as They Combat Human Trafficking and Subvert Authoritarian Regimes.pdf2025-12-19 20:41 2.2M
[   ]Tomer Bar & Omer Attias_Defender-Pretender When Windows Defender Updates Become a Security Risk.pdf2025-12-19 20:41 4.9M
[   ]Tomer Bar & Shmuel Cohen_EDR = Erase Data Remotely, By Cooking An Unforgettable (Byte) Signature Dish.pdf2025-12-19 20:41 4.9M
[   ]Tom Tervoort_Three New Attacks Against JSON Web Tokens.pdf2025-12-19 20:41 2.9M
[   ]Tom Tervoort_Three New Attacks Against JSON Web Tokens_wp.pdf2025-12-19 20:41 252K
[   ]Vladimir Eliezer Tokarev_CoDe16; 16 Zero-Day Vulnerabilities Affecting CODESYS Framework Leading to Remote Code Execution on Millions of Industrial Devices Across Industries.pdf2025-12-19 20:41 6.4M
[   ]Willy Vasquez & Stephen Checkoway & Hovav Shacham_The Most Dangerous Codec in the World Finding and Exploiting Vulnerabilities in H.264 Decoders.pdf2025-12-19 20:41 4.9M
[text]Willy Vasquez & Stephen Checkoway & Hovav Shacham_The Most Dangerous Codec in the World Finding and Exploiting Vulnerabilities in H.264 Decoders_tools.txt2025-12-19 20:41 36
[   ]Xianbo Wang & Kaixuan Luo & Wing Cheong Lau_The Living Dead Hacking Mobile Face Recognition SDKs with Non-Deepfake Attacks.pdf2025-12-19 20:41 13M
[   ]Yong Wang_Make KSMA Great Again The Art of Rooting Android Devices by GPU MMU Features.pdf2025-12-19 20:41 6.0M
[   ]Yueqi Chen,Minghao Lin,Chaoyang Lin,Jiahe Wang,Zicheng Wang,Minghang Shen_Kill Latest MPU-based Protections in Just One Shot Targeting All Commodity RTOSes.pdf2025-12-19 20:41 4.0M
[   ]Yuki Chen_Diving into Windows Remote Access Service for Pre-Auth Bugs.pdf2025-12-19 20:41 3.5M
[   ]Yuki Osawa & Satoru Higuchi & Satoshi Ito & Manabu Nakano & Takayuki Uchiyama_A Manufacturer's Post-Shipment Approach to Fend-Off IoT Malware in Home Appliances.pdf2025-12-19 20:41 2.7M
[   ]Yvan Genuer & Pablo Artuso_Chained to Hit Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software.pdf2025-12-19 20:41 6.2M
[   ]Yvan Genuer & Pablo Artuso_Chained to Hit Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software_WP.pdf2025-12-19 20:41 747K
[   ]Zechao Cai,Jiaxun Zhu,Yutian Yang,Wenbo Shen ,Yu Wang _Apple PAC, Four Years Later Reverse Engineering the Customized Pointer Authentication Hardware Implementation on Apple M1.pdf2025-12-19 20:41 6.1M
[   ]Zhenpeng Lin & Xinyu Xing & Zhaofeng Chen & Kang Li_Bad io_uring A New Era of Rooting for Android.pdf2025-12-19 20:41 6.3M
[   ]Zhenpeng Lin & Xinyu Xing & Zhaofeng Chen & Kang Li_Bad io_uring A New Era of Rooting for Android_wp.pdf2025-12-19 20:41 1.9M
[   ]Zhibo Liu & Yuanyuan Yuan & Xiaofei Xie & Tianxiang Li & Wenqiang Li & Shuai Wang_BTD Unleashing the Power of Decompilation for x86 Deep Neural Network Executables.pdf2025-12-19 20:41 2.2M
[   ]Zhibo Liu & Yuanyuan Yuan & Xiaofei Xie & Tianxiang Li & Wenqiang Li & Shuai Wang_BTD Unleashing the Power of Decompilation for x86 Deep Neural Network Executables_WP.pdf2025-12-19 20:41 1.5M
[   ]Zhou Li & Xiang Li & Qifan Zhang_MaginotDNS Attacking the Boundary of DNS Caching Protection.pdf2025-12-19 20:41 4.3M
[   ]Zhuonan Li & Qi Li & Zimin Lin_Low-level RASP Protecting Applications Implemented in High-level Programming Languages.pdf2025-12-19 20:41 1.9M
[   ]Zuozhi Fan_Dive into Apple UserFS (Userspace Filesystem).pdf2025-12-19 20:41 6.9M