![[ICO]](data:,) | Name | Last modified | Size |
![[parent]](data:,) | Parent Directory | | - |
![[ ]](data:,) | Adam Crosser_Ghost Calls Abusing Web Conferencing for Covert Command & Control.pdf | 2025-12-19 20:41 | 3.9M |
![[ ]](data:,) | Adam Zabrocki&Marko Mitic_How to Secure Unique Ecosystem Shipping 1 Billion+ Cores.pdf | 2025-12-19 20:41 | 2.8M |
![[ ]](data:,) | Alan Michaels&Jared Byers_Use and Abuse of Personal Information -- Politics Edition.pdf | 2025-12-19 20:41 | 13M |
![[ ]](data:,) | Alex Bourla&Graham Brereton_Turning the Tables on GlobalProtect Use and Abuse of Palo Alto's Remote Access Solution.pdf | 2025-12-19 20:41 | 4.4M |
![[ ]](data:,) | Alex Gonzalez_Breaking Chains Hacking Android Key Attestation.pdf | 2025-12-19 20:41 | 4.2M |
![[ ]](data:,) | Alex Kantchelian&Maarten van Dantzig&Diana Kramer_Autonomous Timeline Analysis and Threat Hunting An AI Agent for Timesketch.pdf | 2025-12-19 20:41 | 3.7M |
![[ ]](data:,) | Alex Kantchelian&Ryan Stevens&Yanis Pavlidis&Sadegh Momeni&Casper Neo&Birkett Huber&Elie Bursztein_FACADE High-Precision Insider Threat Detection Using Contrastive Learning.pdf | 2025-12-19 20:41 | 1.9M |
![[ ]](data:,) | Ali Ranjbar&Tianchang Yang&Kai Tu&Saaman Khalilollahi&Kanika Gupta&Syed Rafiul Hussain_Uncovering 'NASty' 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing.pdf | 2025-12-19 20:41 | 17M |
![[ ]](data:,) | Alon Leviev&Netanel Ben Simon&Yair Netzer&Amit Dori_BitUnlocker Leveraging Windows Recovery to Extract BitLocker Secrets.pdf | 2025-12-19 20:41 | 3.6M |
![[ ]](data:,) | Altaf Shaik&Robert Jaschek_The 5G Titanic.pdf | 2025-12-19 20:41 | 2.1M |
![[ ]](data:,) | Andres Riancho&Hillai Ben-Sasson&Ronen Shustin_Breaking Out of The AI Cage Pwning AI Providers with NVIDIA Vulnerabilities.pdf | 2025-12-19 20:41 | 8.3M |
![[ ]](data:,) | Andrew Brandt_Firewalls Under Fire China's 5+ Year Campaign to Penetrate Perimeter Network Defenses.pdf | 2025-12-19 20:41 | 6.7M |
![[ ]](data:,) | Andrzej Olchawa&Milenko Starcik&Ricardo Fradique&Ayman Boulaich_Burning, Trashing, Spacecraft Crashing A Collection of Vulnerabilities That Will End Your Space Mission.pdf | 2025-12-19 20:41 | 3.0M |
![[ ]](data:,) | Angelos Beitis&Mathy Vanhoef_Amplify and Annihilate Discovering and Exploiting Vulnerable Tunnelling Hosts.pdf | 2025-12-19 20:41 | 7.2M |
![[text]](data:,) | Angelos Beitis&Mathy Vanhoef_Amplify and Annihilate Discovering and Exploiting Vulnerable Tunnelling Hosts_tools.txt | 2025-12-19 20:41 | 40 |
![[ ]](data:,) | Angelos Beitis&Mathy Vanhoef_Amplify and Annihilate Discovering and Exploiting Vulnerable Tunnelling Hosts_wp.pdf | 2025-12-19 20:41 | 1.6M |
![[ ]](data:,) | Baptiste David&Tillmann Oßwald_Windows Hell No for Business.pdf | 2025-12-19 20:41 | 3.4M |
![[ ]](data:,) | Bela Genge&Ioan Padurean&Dan Macovei_Exploiting DNS for Stealthy User Tracking.pdf | 2025-12-19 20:41 | 12M |
![[ ]](data:,) | Bela Genge&Ioan Padurean&Dan Macovei_Exploiting DNS for Stealthy User Tracking_WP.pdf | 2025-12-19 20:41 | 2.8M |
![[ ]](data:,) | Ben D. Sawyer&Matthew Canham_Evil Digital Twin, Too The First 30 Months of Psychological Manipulation of Humans by AI.pdf | 2025-12-19 20:41 | 3.5M |
![[ ]](data:,) | Ben Gelman&Sean Bergeron_Anomaly Detection Betrayed Us, so We Gave It a New Job Enhancing Command Line Classification with Benign Anomalous Data.pdf | 2025-12-19 20:41 | 3.1M |
![[ ]](data:,) | Brendan Dolan-Gavitt_AI Agents for Offsec with Zero False Positives.pdf | 2025-12-19 20:41 | 15M |
![[ ]](data:,) | Christian Dameff&Ariana Mirian_Pwning User Phishing Training Through Scientific Lure Crafting.pdf | 2025-12-19 20:41 | 2.6M |
![[ ]](data:,) | Christopher Domas_Ghosts in the Machine Check - Conjuring Hardware Failures to Breach CPU Privilege Boundaries.pdf | 2025-12-19 20:41 | 14M |
![[ ]](data:,) | Colin Estep&Dagmawi Mulugeta_Your Traffic Doesn't Lie Unmasking Supply Chain Attacks via Application Behaviour.pdf | 2025-12-19 20:41 | 6.1M |
![[ ]](data:,) | Connor McGarr_Out Of Control How KCFG and KCET Redefine Control Flow Integrity in the Windows Kernel.pdf | 2025-12-19 20:41 | 2.6M |
![[ ]](data:,) | David Brauchler III_When Guardrails Aren't Enough Reinventing Agentic AI Security With Architectural Controls.pdf | 2025-12-19 20:41 | 1.5M |
![[ ]](data:,) | Deral Heiland&Carlota Bindner_Weaponization of Cellular Based IoT Technology – Leveraging Smart Devices to Gain a Foothold.pdf | 2025-12-19 20:41 | 3.4M |
![[ ]](data:,) | Dirk-jan Mollema_Advanced Active Directory to Entra ID Lateral Movement Techniques.pdf | 2025-12-19 20:41 | 5.0M |
![[ ]](data:,) | Estelle Ruellan&Olivier Bilodeau_Hackers Dropping Mid-Heist Selfies LLM Identifies Information Stealer Infection Vector and Extracts IoCs.pdf | 2025-12-19 20:41 | 13M |
![[ ]](data:,) | Felix Eberstaller&Bernhard Rader&Sebastian Ranftl_Tracking the Tractors Analyzing Smart Farming Automation Systems for Fun and Profit.pdf | 2025-12-19 20:41 | 5.6M |
![[ ]](data:,) | Fengyu Liu&YouKun Shi&Tian Chen&Bocheng Xiang&Junyao He&Qi Li&Guangliang Yang&Yuan Zhang&Min Yang_Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications.pdf | 2025-12-19 20:41 | 3.5M |
![[ ]](data:,) | Fikret Garipay_Bypassing PQC Signature Verification with Fault Injection Dilithium, XMSS, SPHINCS+.pdf | 2025-12-19 20:41 | 2.3M |
![[ ]](data:,) | Garrett Foster_Clustered Points of Failure - Attacking Windows Server Failover Clusters.pdf | 2025-12-19 20:41 | 21M |
![[text]](data:,) | Garrett Foster_Clustered Points of Failure - Attacking Windows Server Failover Clusters_TOOLS.txt | 2025-12-19 20:41 | 118 |
![[ ]](data:,) | Haakon Gulbrandsrud_Azure's Weakest Link How API Connections Spill Secrets.pdf | 2025-12-19 20:41 | 4.1M |
![[ ]](data:,) | Hayato Kimura&Ryoma Ito&Kazuhiko Minematsu&Shogo Shiraki&Takanori Isobe_Not Sealed Practical Attacks on Nostr, a Decentralized Censorship-Resistant Protocol.pdf | 2025-12-19 20:41 | 6.0M |
![[ ]](data:,) | Ibrahim El-sayed_Decoding Signal Understanding the Real Privacy Guarantees of E2EE.pdf | 2025-12-19 20:41 | 13M |
![[ ]](data:,) | Itay Ravia_Smashing Model Scanners Advanced Bypass Techniques and a Novel Detection Approach.pdf | 2025-12-19 20:41 | 3.0M |
![[ ]](data:,) | James Kettle_HTTP1.1 Must Die! The Desync Endgame.pdf | 2025-12-19 20:41 | 1.1M |
![[ ]](data:,) | James Kettle_HTTP1.1 Must Die! The Desync Endgame_WP.pdf | 2025-12-19 20:41 | 915K |
![[ ]](data:,) | Ji'an Zhou&Li'shuo Song_Safe Harbor or Hostile Waters Unveiling the Hidden Perils of the TorchScript Engine in PyTorch.pdf | 2025-12-19 20:41 | 18M |
![[ ]](data:,) | Jiashuo Liang&Guancheng Li_Universal and Context-Independent Triggers for Precise Control of LLM Outputs.pdf | 2025-12-19 20:41 | 3.3M |
![[ ]](data:,) | Jietao Yang_Booting into Breaches Hunting Windows SecureBoot's Remote Attack Surfaces.pdf | 2025-12-19 20:41 | 13M |
![[ ]](data:,) | Kaixuan Luo&Xianbo Wang&Adonis Fung&Yanxiang Bi&Wing Cheong Lau_Back to the Future Hacking and Securing Connection-based OAuth Architectures in Agentic AI and Integration Platforms.pdf | 2025-12-19 20:41 | 13M |
![[ ]](data:,) | Kazuki Matsuo_Shade BIOS Unleashing the Full Stealth of UEFI Malware.pdf | 2025-12-19 20:41 | 2.1M |
![[ ]](data:,) | Koh Nakagawa_XUnprotect Reverse Engineering macOS XProtect Remediator.pdf | 2025-12-19 20:41 | 6.4M |
![[text]](data:,) | Koh Nakagawa_XUnprotect Reverse Engineering macOS XProtect Remediator_TOOLS.txt | 2025-12-19 20:41 | 65 |
![[ ]](data:,) | Kyle Avery_Training Specialist Models Automating Malware Development.pdf | 2025-12-19 20:41 | 734K |
![[ ]](data:,) | Lance Cain&Daniel Mayer_Leveraging Jamf for Red Teaming in Enterprise Environments.pdf | 2025-12-19 20:41 | 1.6M |
![[ ]](data:,) | Lukas Maar&Lukas Giner_Derandomizing the Location of Security-Critical Kernel Objects in the Linux Kernel.pdf | 2025-12-19 20:41 | 12M |
![[ ]](data:,) | Marco Casagrande&Daniele Antonioli_E-Trojans Ransomware, Tracking, DoS, and Data Leaks on Xiaomi Electric Scooters.pdf | 2025-12-19 20:41 | 2.8M |
![[ ]](data:,) | Marco Casagrande&Daniele Antonioli_E-Trojans Ransomware, Tracking, DoS, and Data Leaks on Xiaomi Electric Scooters_WP.pdf | 2025-12-19 20:41 | 5.0M |
![[ ]](data:,) | Marcos Bajo&Christian Rossow_Coroutine Frame-Oriented Programming Breaking Control Flow Integrity by Abusing Modern C++.pdf | 2025-12-19 20:41 | 9.7M |
![[ ]](data:,) | Marius Muench&Sam Collins&Tom Chothia_Watching the Watchers Exploring and Testing Defenses of Anti-Cheat Systems.pdf | 2025-12-19 20:41 | 7.8M |
![[ ]](data:,) | Morgan Hervé-Mignucci_Digital Dominoes Scanning the Internet to Expose Systemic Cyber Risk.pdf | 2025-12-19 20:41 | 11M |
![[ ]](data:,) | Naor Haziz_ECS-cape – Hijacking IAM Privileges in Amazon ECS.pdf | 2025-12-19 20:41 | 5.1M |
![[text]](data:,) | Naor Haziz_ECS-cape – Hijacking IAM Privileges in Amazon ECS_tools.txt | 2025-12-19 20:41 | 36 |
![[ ]](data:,) | Neophytos Christou&Andreas Kellas_QUACK Hindering Deserialization Attacks via Static Duck Typing.pdf | 2025-12-19 20:41 | 3.4M |
![[ ]](data:,) | Noam Moshe_Turning Camera Surveillance on its Axis.pdf | 2025-12-19 20:41 | 4.6M |
![[text]](data:,) | not_in_list.txt | 2025-12-19 20:41 | 4.8K |
![[archive]](data:,) | Olaf Hartong_I'm in Your Logs Now, Deceiving Your Analysts and Blinding Your EDR_Compressed.7z | 2025-12-19 20:41 | 24M |
![[ ]](data:,) | Philip Young&Chad Rikansrud_Unix Underworld Tales from the Dark Side of zOS.pdf | 2025-12-19 20:41 | 11M |
![[ ]](data:,) | Pinji Chen&Jianjun Chen&Qi Wang&Mingming Zhang&Haixin Duan_Cross-Origin Web Attacks via HTTP2 Server Push and Signed HTTP Exchange.pdf | 2025-12-19 20:41 | 2.1M |
![[ ]](data:,) | Pinji Chen&Jianjun Chen&Qi Wang&Mingming Zhang&Haixin Duan_Cross-Origin Web Attacks via HTTP2 Server Push and Signed HTTP Exchange_WP.pdf | 2025-12-19 20:41 | 1.2M |
![[ ]](data:,) | Qibo Shi&Victor V&Wei Xiao&Zhiniang Peng_Diving into Windows HTTP Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services.pdf | 2025-12-19 20:41 | 2.7M |
![[ ]](data:,) | Qinrun Dai&Yifei Xie_BinWhisper LLM-Driven Reasoning for Automated Vulnerability Discovery Behind Hall-of-Fame.pdf | 2025-12-19 20:41 | 1.5M |
![[ ]](data:,) | Rama Hoetzlein_Protecting Small Organizations in the Era of AI Bots.pdf | 2025-12-19 20:41 | 5.6M |
![[ ]](data:,) | Rebecca Lynch&Rich Harang_From Prompts to Pwns Exploiting and Securing AI Agents.pdf | 2025-12-19 20:41 | 6.1M |
![[ ]](data:,) | Renée Burton&Dave Mitchell&Christopher Kim_No Hoodies Here Organized Crime in AdTech.pdf | 2025-12-19 20:41 | 17M |
![[ ]](data:,) | Rex Guo&Khang Nguyen_Death by Noise Abusing Alert Fatigue to Bypass the SOC (EDR Edition).pdf | 2025-12-19 20:41 | 1.8M |
![[ ]](data:,) | Ryan Barnett&Isabella Barnett_Lost in Translation Exploiting Unicode Normalization.pdf | 2025-12-19 20:41 | 4.5M |
![[ ]](data:,) | Salvatore Gariuolo_Smart Charging, Smarter Hackers The Unseen Risks of ISO 15118.pdf | 2025-12-19 20:41 | 1.7M |
![[ ]](data:,) | Sandro Rüegge&Johannes Wikner_Racing for Privilege Leaking Privileged Memory From Any Intel System Using a Microarchitectural Race Condition.pdf | 2025-12-19 20:41 | 5.4M |
![[text]](data:,) | Sandro Rüegge&Johannes Wikner_Racing for Privilege Leaking Privileged Memory From Any Intel System Using a Microarchitectural Race Condition_TOOLS.txt | 2025-12-19 20:41 | 36 |
![[ ]](data:,) | Sandro Rüegge&Johannes Wikner_Racing for Privilege Leaking Privileged Memory From Any Intel System Using a Microarchitectural Race Condition_WP.pdf | 2025-12-19 20:41 | 534K |
![[ ]](data:,) | Sasha Zyuzin&Ruikai Peng_Thinking Outside the Sink How Tree-of-AST Redefines the Boundaries of Dataflow Analysis_Compressed.pdf | 2025-12-19 20:41 | 23M |
![[ ]](data:,) | Shu-Hao Tung_From Spoofing to Tunneling New Red Team's Networking Techniques for Initial Access and Evasion.pdf | 2025-12-19 20:41 | 5.0M |
![[ ]](data:,) | Shu-Hao Tung_From Spoofing to Tunneling New Red Team's Networking Techniques for Initial Access and Evasion_wp.pdf | 2025-12-19 20:41 | 3.4M |
![[ ]](data:,) | Sid Rao&Gabriela Sonkeri&Amel Bourdoucen&Janne Lindqvist_Lost & Found The Hidden Risks of Account Recovery in a Passwordless Future.pdf | 2025-12-19 20:41 | 2.7M |
![[text]](data:,) | Sid Rao&Gabriela Sonkeri&Amel Bourdoucen&Janne Lindqvist_Lost & Found The Hidden Risks of Account Recovery in a Passwordless Future_TOOLS.txt | 2025-12-19 20:41 | 87 |
![[ ]](data:,) | Sid Rao&Gabriela Sonkeri&Amel Bourdoucen&Janne Lindqvist_Lost & Found The Hidden Risks of Account Recovery in a Passwordless Future_WP.pdf | 2025-12-19 20:41 | 367K |
![[ ]](data:,) | Tianchang Yang&Kai Tu&Syed Md Mukit Rashid&Ali Ranjbar&Gang Tan&Syed Rafiul Hussain_Open RAN, Open Risk Uncovering Threats and Exposing Vulnerabilities in Next-Gen Cellular RAN.pdf | 2025-12-19 20:41 | 3.8M |
![[ ]](data:,) | Tien-Chih Lin&Wei Chieh Chao&Zhao-Min Chen_Pay Attention to the Clue Clue-Driven Reverse Engineering by LLM in Real-World Malware Analysis.pdf | 2025-12-19 20:41 | 7.4M |
![[text]](data:,) | Tien-Chih Lin&Wei Chieh Chao&Zhao-Min Chen_Pay Attention to the Clue Clue-Driven Reverse Engineering by LLM in Real-World Malware Analysis_tools.txt | 2025-12-19 20:41 | 42 |
![[ ]](data:,) | Tod Beardsley_Vulnerability Haruspicy Picking Out Risk Signals from Scoring System Entrails.pdf | 2025-12-19 20:41 | 4.4M |
![[ ]](data:,) | Tod Beardsley_Vulnerability Haruspicy Picking Out Risk Signals from Scoring System Entrails_WP.pdf | 2025-12-19 20:41 | 4.2M |
![[ ]](data:,) | Tom Tervoort_No VPN Needed Cryptographic Attacks Against the OPC UA Protocol.pdf | 2025-12-19 20:41 | 4.3M |
![[text]](data:,) | Tom Tervoort_No VPN Needed Cryptographic Attacks Against the OPC UA Protocol_TOOLS.txt | 2025-12-19 20:41 | 37 |
![[ ]](data:,) | Tom Tervoort_No VPN Needed Cryptographic Attacks Against the OPC UA Protocol_WP.pdf | 2025-12-19 20:41 | 710K |
![[ ]](data:,) | Vaisha Bernard_Consent & Compromise Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications.pdf | 2025-12-19 20:41 | 5.2M |
![[ ]](data:,) | Varun Sharma&Ashish Kurmi_When 'Changed Files' Changed Everything Uncovering and Responding to the tj-actions Supply Chain Breach.pdf | 2025-12-19 20:41 | 5.6M |
![[ ]](data:,) | Varun Sharma&Ashish Kurmi_When 'Changed Files' Changed Everything Uncovering and Responding to the tj-actions Supply Chain Breach_WP.pdf | 2025-12-19 20:41 | 828K |
![[ ]](data:,) | Vedang Parasnis_Kernel-Enforced DNS Exfiltration Security Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale.pdf | 2025-12-19 20:41 | 2.9M |
![[ ]](data:,) | Vedang Parasnis_Kernel-Enforced DNS Exfiltration Security Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale_WP.pdf | 2025-12-19 20:41 | 2.9M |
![[ ]](data:,) | Xiaochen Wang&Yiping Liu&Xiaoman Wang&Cong Cheng_LLMDYara LLMs-Driven Automated YARA Rules Generation with Explainable File Features and DNAHash.pdf | 2025-12-19 20:41 | 6.0M |
![[ ]](data:,) | Yoav Magid_AppleStorm - Unmasking the Privacy Risks of Apple Intelligence.pdf | 2025-12-19 20:41 | 2.5M |
![[text]](data:,) | Yoav Magid_AppleStorm - Unmasking the Privacy Risks of Apple Intelligence_tools.txt | 2025-12-19 20:41 | 46 |
![[ ]](data:,) | Yuan Luo&Zhaojun Chen&Yi Sun&Rhettxie Rhettxie_More Flows, More Bugs Empowering SAST with LLMs and Customized DFA.pdf | 2025-12-19 20:41 | 6.4M |
![[ ]](data:,) | Yuhao Jiang&Xinlei Ying&Ziming Zhang_Dark Corners How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years.pdf | 2025-12-19 20:41 | 2.5M |
![[ ]](data:,) | Yu Wang&Weiteng Chen_Dead Pixel Detected - A Security Assessment of Apple's Graphics Subsystem.pdf | 2025-12-19 20:41 | 6.0M |
![[ ]](data:,) | Zhisheng Hu&Shanit Gupta&Cooper de Nicola_Adversarial Fuzzer for Teleoperation Commands Evaluating Autonomous Vehicle Resilience.pdf | 2025-12-19 20:41 | 6.8M |