Bosen's Playground
Name
Last modified
Size
Parent Directory
-
Adnan Khan & John Stawinski_Self-Hosted GitHub CICD Runners Continuous Integration, Continuous Destruction.pdf
2024-08-09 22:12
8.3M
Adrian Coleșa & Sorin Boloș_From Weapon to Target Quantum Computers Paradox.pdf
2024-08-10 01:56
2.4M
Alex Plaskett & Robert Herrera_Listen Up Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap.pdf
2024-08-10 02:07
2.6M
Alon Leviev_Windows Downdate Downgrade Attacks Using Windows Updates.pdf
2024-08-09 20:48
2.0M
Anders Fogh & Daniel Gruss_Microarchitecture Vulnerabilities Past, Present, and Future.pdf
2024-08-10 02:48
9.7M
Chris Wysopal_From HAL to HALT Thwarting Skynet's Siblings in the GenAI Coding Era.pdf
2024-08-10 04:51
5.6M
Cory Michal & Brandon Levene & Ben Pruce_Modern Kill Chains Real World SaaS Attacks and Mitigation Strategies.pdf
2024-08-09 22:11
5.4M
Dalya Manatova & L Jean Camp_Relationships Matter Reconstructing the Organizational and Social Structure of a Ransomware Gang.pdf
2024-08-09 23:59
2.6M
Daniel Gruss & Stefan Gast_SnailLoad Anyone on the Internet Can Learn What You're Doing.pdf
2024-08-10 01:50
6.1M
Dyon Goos & Marius Muench_Overcoming State Finding Baseband Vulnerabilities by Fuzzing Layer-2.pdf
2024-08-10 02:15
5.6M
Edouard Bochin & Tao Yan & Bo Qu_Let the Cache Cache and Let the WebAssembly Assemble Knockin' on Chrome's Shell.pdf
2024-08-09 20:37
3.5M
Eric Woodruff_UnOAuthorized A Technique to Privilege Escalation to Global Administrator.pdf
2024-08-10 01:53
5.5M
Eyal Paz & Liad Cohen_Will We Survive the Transitive Vulnerability Locusts.pdf
2024-08-10 02:43
5.5M
Fabian Bäumer_Terrapin Attack Breaking SSH Channel Integrity by Sequence Number Manipulation.pdf
2024-08-10 02:16
1.7M
Fabian Bäumer_Terrapin Attack Breaking SSH Channel Integrity by Sequence Number Manipulation_tools.txt
2024-08-10 02:17
45
Fabian Bäumer_Terrapin Attack Breaking SSH Channel Integrity by Sequence Number Manipulation_WP.pdf
2024-08-10 02:17
965K
Franky Saegerman_Foreign Information Manipulation and Interference (Disinformation 2.0) Based on Learnings from 30 Years at NATO.pdf
2024-08-09 23:52
8.8M
Fred Heiding & Alex O'Neill & Lachlan Price & Eric Rosenbach_A Framework for Evaluating National Cybersecurity Strategies.pdf
2024-08-09 20:55
13M
Gareth Heyes_Splitting the Email Atom Exploiting Parsers to Bypass Access Controls.pdf
2024-08-09 22:13
6.4M
Gareth Heyes_Splitting the Email Atom Exploiting Parsers to Bypass Access Controls_WP.pdf
2024-08-09 22:13
3.0M
Hao Wang & Caleb Sargent & Harrison Pomeroy & Renana Friedlich_Into the Inbox Novel Email Spoofing Attack Patterns.pdf
2024-08-10 00:01
13M
HD Moore & Rob King_Secure Shells in Shambles.pdf
2024-08-10 00:02
8.3M
How Hackers Changed the Media (and the Media Changed Hackers).pdf
2024-08-10 01:58
556K
Jacob Larsen_From Doxing to Doorstep Exposing Privacy Intrusion Techniques used by Hackers for Extortion.pdf
2024-08-10 01:43
3.2M
James Kettle_Listen to the Whispers Web Timing Attacks that Actually Work.pdf
2024-08-09 20:40
6.5M
James Kettle_Listen to the Whispers Web Timing Attacks that Actually Work_tools.txt
2024-08-09 20:42
42
James Kettle_Listen to the Whispers Web Timing Attacks that Actually Work_WP.pdf
2024-08-09 20:40
1.7M
Jean-Philippe Aumasson & Chervine Majeri_Hardening HSMs for Banking-Grade Crypto Wallets.pdf
2024-08-09 20:59
2.4M
Josh Wiedemeier & Elliot Tarbet & Max Zheng & Jerry Teng & Ximeng Liu & Muhyun Kim & Sang Kil Cha & Jessica Ouyang & Kangkook Jee_PyLingual A Python Decompilation Framework for Evolving Python Versions.pdf
2024-08-09 23:53
1.6M
Julien Voisin_Modern Anti-Abuse Mechanisms in Competitive Video Games.pdf
2024-08-10 02:13
2.0M
Kasimir Schulz & Tom Bonner_We R in a Right Pickle With All These Insecure Serialization Formats.pdf
2024-08-09 21:03
2.2M
Kazuki Matsuo_You've Already Been Hacked What if There Is a Backdoor in Your UEFI OROM.pdf
2024-08-10 02:18
2.9M
Kazuki Matsuo_You've Already Been Hacked What if There Is a Backdoor in Your UEFI OROM_tools.txt
2024-08-10 02:19
46
Kendra Albert & Jonathon Penney & Ram Shankar Siva Kumar_Ignore Your Generative AI Safety Instructions. Violate the CFAA.pdf
2024-08-10 02:47
544K
Martin Doyhenard_Gotta Cache Em All Bending the Rules of Web Cache Exploitation.pdf
2024-08-10 01:57
4.7M
Martin Doyhenard_Gotta Cache Em All Bending the Rules of Web Cache Exploitation_WP.pdf
2024-08-10 01:57
726K
Michael Bargury & Avishai Efrati_15 Ways to Break Your Copilot.pdf
2024-08-10 04:19
11M
Michael Bargury & Tamir Ishay Sharbat & Gal Malka & Lana Salameh_Living off Microsoft Copilot.pdf
2024-08-10 03:46
16M
Michael Kouremetis & Marissa Dotter & Alex Byrne & Dan Martin & Ethan Michalak & Gianpaolo Russo & Michael Threet_What Lies Beneath the Surface Evaluating LLMs for Offensive Cyber Capabilities through P.pdf
2024-08-10 02:30
3.4M
Morgan Demboski & Mark Parsons_Surfacing a Hydra Unveiling a Multi-Headed Chinese State-Sponsored Campaign Against a Foreign Government.pdf
2024-08-10 01:51
4.8M
Nan Wang & Zhenghang Xiao & Xuehao Guo & Qinrun Dai_Super Hat Trick Exploit Chrome and Firefox Four Times.pdf
2024-08-10 00:03
5.2M
Nan Wang & Zhenghang Xiao & Xuehao Guo & Qinrun Dai_Super Hat Trick Exploit Chrome and Firefox Four Times_WP.pdf
2024-08-10 00:04
915K
Nick Frichette_Kicking in the Door to the Cloud Exploiting Cloud Provider Vulnerabilities for Initial Access.pdf
2024-08-09 23:53
6.3M
Noam Moshe_From Exploits to Forensics Evidence - Unraveling the Unitronics Attack.pdf
2024-08-09 20:59
6.7M
Orange Tsai_Confusion Attacks Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! (PRE-RECORDED).pdf
2024-08-10 02:24
4.0M
Ori David_Tunnel Vision Exploring VPN Post-Exploitation Techniques.pdf
2024-08-09 20:45
1.9M
Qi Wang & Jianjun Chen & Run Guo & Chao Zhang & Haixin Duan_Break the Wall from Bottom Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.pdf
2024-08-10 02:31
4.4M
Qi Wang & Xiang Li & Chuhan Wang_TuDoor Attack Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.pdf
2024-08-10 00:00
6.1M
Richard Harang_Practical LLM Security Takeaways From a Year in the Trenches.pdf
2024-08-09 20:44
2.8M
Ryan Kane & Rushank Shetty_Are Your Backups Still Immutable, Even Though You Can't Access Them.pdf
2024-08-10 02:44
5.4M
Sanne Maasakkers_Unraveling the Mind Behind the APT - Analyzing the Role of Pretexting in CTI and Attribution.pdf
2024-08-09 22:14
2.8M
Sara Farmer_Reinforcement Learning for Autonomous Resilient Cyber Defense.pdf
2024-08-10 02:02
2.0M
Sara Farmer_Reinforcement Learning for Autonomous Resilient Cyber Defense_WP.pdf
2024-08-10 02:02
534K
Shachar Menashe_From MLOps to MLOops - Exposing the Attack Surface of Machine Learning Platforms.pdf
2024-08-10 02:06
4.4M
Sheng-Hao Ma & Yi-An Lin & Mars Cheng_Attention Is All You Need for Semantics Detection A Novel Transformer on Neural-Symbolic Approach.pdf
2024-08-10 02:46
9.2M
Thijs Alkemade & Khaled Nassar & Daan Keuper_Low Energy to High Energy Hacking Nearby EV-Chargers Over Bluetooth.pdf
2024-08-10 04:28
6.1M
Thomas Roth_ACE Up the Sleeve Hacking Into Apple's New USB-C Controller.pdf
2024-08-10 04:54
20M
Tom Dohrmann_All Your Secrets Belong to Us Leveraging Firmware Bugs to Break TEEs.pdf
2024-08-09 20:57
1.0M
Toshinori Usui & Yuto Otsuki & Ryo Kubota & Yuhei Kawakoya & Makoto Iwamura & Kanta Matsuura_Bytecode Jiu-Jitsu Choking Interpreters to Force Execution of Malicious Bytecode.pdf
2024-08-10 02:23
4.9M
Vasilios Mavroudis & Jamie Gawith & Sañyam Vyas & Chris Hicks_Deep Backdoors in Deep Reinforcement Learning Agents.pdf
2024-08-09 23:50
2.1M
Vladyslav Babkin_Securing Network Appliances New Technologies and Old Challenges.pdf
2024-08-10 02:28
3.1M
Xiling Gong & Xuan Xing & Eugene Rodionov_The Way to Android Root Exploiting Your GPU on Smartphone.pdf
2024-08-10 01:51
1.5M
Xin'an Zhou & Zhiyun Qian & Juefei Pu & Qing Deng & Srikanth Krishnamurthy & Keyu Man_Fallen Tower of Babel Rooting Wireless Mesh Networks by Abusing Heterogeneous Control Protocols.pdf
2024-08-09 20:38
2.3M
Yajin Zhou_Use Your Spell Against You Threat Prevention of Smart Contract Exploit By Reusing Opcode Trace.pdf
2024-08-10 02:42
1.6M
Yakir Kadkoda & Michael Katchinskiy & Ofek Itach_Breaching AWS Accounts Through Shadow Resources.pdf
2024-08-09 20:32
8.6M
Yehuda Smirnov_Hook, Line and Sinker Phishing Windows Hello for Business.pdf
2024-08-10 02:40
5.9M
Zhiyun Qian & Jiayi Hu & Jinmeng Zhou & Qi Tang & Wenbo Shen_PageJack A Powerful Exploit Technique With Page-Level UAF.pdf
2024-08-10 02:40
1.4M
Zhongquan Li & Qidan He_Unveiling Mac Security A Comprehensive Exploration of Sandboxing and AppData TCC.pdf
2024-08-10 02:52
17M
Zisis Sialveras_Bugs of Yore A Bug Hunting Journey on VMware's Hypervisor.pdf
2024-08-09 20:57
3.6M