[ICO]NameLast modifiedSize
[parent]Parent Directory  -
[   ]Adnan Khan & John Stawinski_Self-Hosted GitHub CICD Runners Continuous Integration, Continuous Destruction.pdf2024-08-09 22:12 8.3M
[   ]Adrian Coleșa & Sorin Boloș_From Weapon to Target Quantum Computers Paradox.pdf2024-08-10 01:56 2.4M
[   ]Alex Plaskett & Robert Herrera_Listen Up Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap.pdf2024-08-10 02:07 2.6M
[   ]Alon Leviev_Windows Downdate Downgrade Attacks Using Windows Updates.pdf2024-08-09 20:48 2.0M
[   ]Anders Fogh & Daniel Gruss_Microarchitecture Vulnerabilities Past, Present, and Future.pdf2024-08-10 02:48 9.7M
[   ]Chris Wysopal_From HAL to HALT Thwarting Skynet's Siblings in the GenAI Coding Era.pdf2024-08-10 04:51 5.6M
[   ]Cory Michal & Brandon Levene & Ben Pruce_Modern Kill Chains Real World SaaS Attacks and Mitigation Strategies.pdf2024-08-09 22:11 5.4M
[   ]Dalya Manatova & L Jean Camp_Relationships Matter Reconstructing the Organizational and Social Structure of a Ransomware Gang.pdf2024-08-09 23:59 2.6M
[   ]Daniel Gruss & Stefan Gast_SnailLoad Anyone on the Internet Can Learn What You're Doing.pdf2024-08-10 01:50 6.1M
[   ]Dyon Goos & Marius Muench_Overcoming State Finding Baseband Vulnerabilities by Fuzzing Layer-2.pdf2024-08-10 02:15 5.6M
[   ]Edouard Bochin & Tao Yan & Bo Qu_Let the Cache Cache and Let the WebAssembly Assemble Knockin' on Chrome's Shell.pdf2024-08-09 20:37 3.5M
[   ]Eric Woodruff_UnOAuthorized A Technique to Privilege Escalation to Global Administrator.pdf2024-08-10 01:53 5.5M
[   ]Eyal Paz & Liad Cohen_Will We Survive the Transitive Vulnerability Locusts.pdf2024-08-10 02:43 5.5M
[   ]Fabian Bäumer_Terrapin Attack Breaking SSH Channel Integrity by Sequence Number Manipulation.pdf2024-08-10 02:16 1.7M
[text]Fabian Bäumer_Terrapin Attack Breaking SSH Channel Integrity by Sequence Number Manipulation_tools.txt2024-08-10 02:17 45
[   ]Fabian Bäumer_Terrapin Attack Breaking SSH Channel Integrity by Sequence Number Manipulation_WP.pdf2024-08-10 02:17 965K
[   ]Franky Saegerman_Foreign Information Manipulation and Interference (Disinformation 2.0) Based on Learnings from 30 Years at NATO.pdf2024-08-09 23:52 8.8M
[   ]Fred Heiding & Alex O'Neill & Lachlan Price & Eric Rosenbach_A Framework for Evaluating National Cybersecurity Strategies.pdf2024-08-09 20:55 13M
[   ]Gareth Heyes_Splitting the Email Atom Exploiting Parsers to Bypass Access Controls.pdf2024-08-09 22:13 6.4M
[   ]Gareth Heyes_Splitting the Email Atom Exploiting Parsers to Bypass Access Controls_WP.pdf2024-08-09 22:13 3.0M
[   ]Hao Wang & Caleb Sargent & Harrison Pomeroy & Renana Friedlich_Into the Inbox Novel Email Spoofing Attack Patterns.pdf2024-08-10 00:01 13M
[   ]HD Moore & Rob King_Secure Shells in Shambles.pdf2024-08-10 00:02 8.3M
[   ]How Hackers Changed the Media (and the Media Changed Hackers).pdf2024-08-10 01:58 556K
[   ]Jacob Larsen_From Doxing to Doorstep Exposing Privacy Intrusion Techniques used by Hackers for Extortion.pdf2024-08-10 01:43 3.2M
[   ]James Kettle_Listen to the Whispers Web Timing Attacks that Actually Work.pdf2024-08-09 20:40 6.5M
[text]James Kettle_Listen to the Whispers Web Timing Attacks that Actually Work_tools.txt2024-08-09 20:42 42
[   ]James Kettle_Listen to the Whispers Web Timing Attacks that Actually Work_WP.pdf2024-08-09 20:40 1.7M
[   ]Jean-Philippe Aumasson & Chervine Majeri_Hardening HSMs for Banking-Grade Crypto Wallets.pdf2024-08-09 20:59 2.4M
[   ]Josh Wiedemeier & Elliot Tarbet & Max Zheng & Jerry Teng & Ximeng Liu & Muhyun Kim & Sang Kil Cha & Jessica Ouyang & Kangkook Jee_PyLingual A Python Decompilation Framework for Evolving Python Versions.pdf2024-08-09 23:53 1.6M
[   ]Julien Voisin_Modern Anti-Abuse Mechanisms in Competitive Video Games.pdf2024-08-10 02:13 2.0M
[   ]Kasimir Schulz & Tom Bonner_We R in a Right Pickle With All These Insecure Serialization Formats.pdf2024-08-09 21:03 2.2M
[   ]Kazuki Matsuo_You've Already Been Hacked What if There Is a Backdoor in Your UEFI OROM.pdf2024-08-10 02:18 2.9M
[text]Kazuki Matsuo_You've Already Been Hacked What if There Is a Backdoor in Your UEFI OROM_tools.txt2024-08-10 02:19 46
[   ]Kendra Albert & Jonathon Penney & Ram Shankar Siva Kumar_Ignore Your Generative AI Safety Instructions. Violate the CFAA.pdf2024-08-10 02:47 544K
[   ]Martin Doyhenard_Gotta Cache Em All Bending the Rules of Web Cache Exploitation.pdf2024-08-10 01:57 4.7M
[   ]Martin Doyhenard_Gotta Cache Em All Bending the Rules of Web Cache Exploitation_WP.pdf2024-08-10 01:57 726K
[   ]Michael Bargury & Avishai Efrati_15 Ways to Break Your Copilot.pdf2024-08-10 04:19 11M
[   ]Michael Bargury & Tamir Ishay Sharbat & Gal Malka & Lana Salameh_Living off Microsoft Copilot.pdf2024-08-10 03:46 16M
[   ]Michael Kouremetis & Marissa Dotter & Alex Byrne & Dan Martin & Ethan Michalak & Gianpaolo Russo & Michael Threet_What Lies Beneath the Surface Evaluating LLMs for Offensive Cyber Capabilities through P.pdf2024-08-10 02:30 3.4M
[   ]Morgan Demboski & Mark Parsons_Surfacing a Hydra Unveiling a Multi-Headed Chinese State-Sponsored Campaign Against a Foreign Government.pdf2024-08-10 01:51 4.8M
[   ]Nan Wang & Zhenghang Xiao & Xuehao Guo & Qinrun Dai_Super Hat Trick Exploit Chrome and Firefox Four Times.pdf2024-08-10 00:03 5.2M
[   ]Nan Wang & Zhenghang Xiao & Xuehao Guo & Qinrun Dai_Super Hat Trick Exploit Chrome and Firefox Four Times_WP.pdf2024-08-10 00:04 915K
[   ]Nick Frichette_Kicking in the Door to the Cloud Exploiting Cloud Provider Vulnerabilities for Initial Access.pdf2024-08-09 23:53 6.3M
[   ]Noam Moshe_From Exploits to Forensics Evidence - Unraveling the Unitronics Attack.pdf2024-08-09 20:59 6.7M
[   ]Orange Tsai_Confusion Attacks Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! (PRE-RECORDED).pdf2024-08-10 02:24 4.0M
[   ]Ori David_Tunnel Vision Exploring VPN Post-Exploitation Techniques.pdf2024-08-09 20:45 1.9M
[   ]Qi Wang & Jianjun Chen & Run Guo & Chao Zhang & Haixin Duan_Break the Wall from Bottom Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.pdf2024-08-10 02:31 4.4M
[   ]Qi Wang & Xiang Li & Chuhan Wang_TuDoor Attack Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.pdf2024-08-10 00:00 6.1M
[   ]Richard Harang_Practical LLM Security Takeaways From a Year in the Trenches.pdf2024-08-09 20:44 2.8M
[   ]Ryan Kane & Rushank Shetty_Are Your Backups Still Immutable, Even Though You Can't Access Them.pdf2024-08-10 02:44 5.4M
[   ]Sanne Maasakkers_Unraveling the Mind Behind the APT - Analyzing the Role of Pretexting in CTI and Attribution.pdf2024-08-09 22:14 2.8M
[   ]Sara Farmer_Reinforcement Learning for Autonomous Resilient Cyber Defense.pdf2024-08-10 02:02 2.0M
[   ]Sara Farmer_Reinforcement Learning for Autonomous Resilient Cyber Defense_WP.pdf2024-08-10 02:02 534K
[   ]Shachar Menashe_From MLOps to MLOops - Exposing the Attack Surface of Machine Learning Platforms.pdf2024-08-10 02:06 4.4M
[   ]Sheng-Hao Ma & Yi-An Lin & Mars Cheng_Attention Is All You Need for Semantics Detection A Novel Transformer on Neural-Symbolic Approach.pdf2024-08-10 02:46 9.2M
[   ]Thijs Alkemade & Khaled Nassar & Daan Keuper_Low Energy to High Energy Hacking Nearby EV-Chargers Over Bluetooth.pdf2024-08-10 04:28 6.1M
[   ]Thomas Roth_ACE Up the Sleeve Hacking Into Apple's New USB-C Controller.pdf2024-08-10 04:54 20M
[   ]Tom Dohrmann_All Your Secrets Belong to Us Leveraging Firmware Bugs to Break TEEs.pdf2024-08-09 20:57 1.0M
[   ]Toshinori Usui & Yuto Otsuki & Ryo Kubota & Yuhei Kawakoya & Makoto Iwamura & Kanta Matsuura_Bytecode Jiu-Jitsu Choking Interpreters to Force Execution of Malicious Bytecode.pdf2024-08-10 02:23 4.9M
[   ]Vasilios Mavroudis & Jamie Gawith & Sañyam Vyas & Chris Hicks_Deep Backdoors in Deep Reinforcement Learning Agents.pdf2024-08-09 23:50 2.1M
[   ]Vladyslav Babkin_Securing Network Appliances New Technologies and Old Challenges.pdf2024-08-10 02:28 3.1M
[   ]Xiling Gong & Xuan Xing & Eugene Rodionov_The Way to Android Root Exploiting Your GPU on Smartphone.pdf2024-08-10 01:51 1.5M
[   ]Xin'an Zhou & Zhiyun Qian & Juefei Pu & Qing Deng & Srikanth Krishnamurthy & Keyu Man_Fallen Tower of Babel Rooting Wireless Mesh Networks by Abusing Heterogeneous Control Protocols.pdf2024-08-09 20:38 2.3M
[   ]Yajin Zhou_Use Your Spell Against You Threat Prevention of Smart Contract Exploit By Reusing Opcode Trace.pdf2024-08-10 02:42 1.6M
[   ]Yakir Kadkoda & Michael Katchinskiy & Ofek Itach_Breaching AWS Accounts Through Shadow Resources.pdf2024-08-09 20:32 8.6M
[   ]Yehuda Smirnov_Hook, Line and Sinker Phishing Windows Hello for Business.pdf2024-08-10 02:40 5.9M
[   ]Zhiyun Qian & Jiayi Hu & Jinmeng Zhou & Qi Tang & Wenbo Shen_PageJack A Powerful Exploit Technique With Page-Level UAF.pdf2024-08-10 02:40 1.4M
[   ]Zhongquan Li & Qidan He_Unveiling Mac Security A Comprehensive Exploration of Sandboxing and AppData TCC.pdf2024-08-10 02:52 17M
[   ]Zisis Sialveras_Bugs of Yore A Bug Hunting Journey on VMware's Hypervisor.pdf2024-08-09 20:57 3.6M