[ICO]NameLast modifiedSize
[parent]Parent Directory  -
[   ]Adam Crosser_Ghost Calls Abusing Web Conferencing for Covert Command & Control.pdf2025-12-19 20:41 3.9M
[   ]Adam Zabrocki&Marko Mitic_How to Secure Unique Ecosystem Shipping 1 Billion+ Cores.pdf2025-12-19 20:41 2.8M
[   ]Alan Michaels&Jared Byers_Use and Abuse of Personal Information -- Politics Edition.pdf2025-12-19 20:41 13M
[   ]Alex Bourla&Graham Brereton_Turning the Tables on GlobalProtect Use and Abuse of Palo Alto's Remote Access Solution.pdf2025-12-19 20:41 4.4M
[   ]Alex Gonzalez_Breaking Chains Hacking Android Key Attestation.pdf2025-12-19 20:41 4.2M
[   ]Alex Kantchelian&Maarten van Dantzig&Diana Kramer_Autonomous Timeline Analysis and Threat Hunting An AI Agent for Timesketch.pdf2025-12-19 20:41 3.7M
[   ]Alex Kantchelian&Ryan Stevens&Yanis Pavlidis&Sadegh Momeni&Casper Neo&Birkett Huber&Elie Bursztein_FACADE High-Precision Insider Threat Detection Using Contrastive Learning.pdf2025-12-19 20:41 1.9M
[   ]Ali Ranjbar&Tianchang Yang&Kai Tu&Saaman Khalilollahi&Kanika Gupta&Syed Rafiul Hussain_Uncovering 'NASty' 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing.pdf2025-12-19 20:41 17M
[   ]Alon Leviev&Netanel Ben Simon&Yair Netzer&Amit Dori_BitUnlocker Leveraging Windows Recovery to Extract BitLocker Secrets.pdf2025-12-19 20:41 3.6M
[   ]Altaf Shaik&Robert Jaschek_The 5G Titanic.pdf2025-12-19 20:41 2.1M
[   ]Andres Riancho&Hillai Ben-Sasson&Ronen Shustin_Breaking Out of The AI Cage Pwning AI Providers with NVIDIA Vulnerabilities.pdf2025-12-19 20:41 8.3M
[   ]Andrew Brandt_Firewalls Under Fire China's 5+ Year Campaign to Penetrate Perimeter Network Defenses.pdf2025-12-19 20:41 6.7M
[   ]Andrzej Olchawa&Milenko Starcik&Ricardo Fradique&Ayman Boulaich_Burning, Trashing, Spacecraft Crashing A Collection of Vulnerabilities That Will End Your Space Mission.pdf2025-12-19 20:41 3.0M
[   ]Angelos Beitis&Mathy Vanhoef_Amplify and Annihilate Discovering and Exploiting Vulnerable Tunnelling Hosts.pdf2025-12-19 20:41 7.2M
[text]Angelos Beitis&Mathy Vanhoef_Amplify and Annihilate Discovering and Exploiting Vulnerable Tunnelling Hosts_tools.txt2025-12-19 20:41 40
[   ]Angelos Beitis&Mathy Vanhoef_Amplify and Annihilate Discovering and Exploiting Vulnerable Tunnelling Hosts_wp.pdf2025-12-19 20:41 1.6M
[   ]Baptiste David&Tillmann Oßwald_Windows Hell No for Business.pdf2025-12-19 20:41 3.4M
[   ]Bela Genge&Ioan Padurean&Dan Macovei_Exploiting DNS for Stealthy User Tracking.pdf2025-12-19 20:41 12M
[   ]Bela Genge&Ioan Padurean&Dan Macovei_Exploiting DNS for Stealthy User Tracking_WP.pdf2025-12-19 20:41 2.8M
[   ]Ben D. Sawyer&Matthew Canham_Evil Digital Twin, Too The First 30 Months of Psychological Manipulation of Humans by AI.pdf2025-12-19 20:41 3.5M
[   ]Ben Gelman&Sean Bergeron_Anomaly Detection Betrayed Us, so We Gave It a New Job Enhancing Command Line Classification with Benign Anomalous Data.pdf2025-12-19 20:41 3.1M
[   ]Brendan Dolan-Gavitt_AI Agents for Offsec with Zero False Positives.pdf2025-12-19 20:41 15M
[   ]Christian Dameff&Ariana Mirian_Pwning User Phishing Training Through Scientific Lure Crafting.pdf2025-12-19 20:41 2.6M
[   ]Christopher Domas_Ghosts in the Machine Check - Conjuring Hardware Failures to Breach CPU Privilege Boundaries.pdf2025-12-19 20:41 14M
[   ]Colin Estep&Dagmawi Mulugeta_Your Traffic Doesn't Lie Unmasking Supply Chain Attacks via Application Behaviour.pdf2025-12-19 20:41 6.1M
[   ]Connor McGarr_Out Of Control How KCFG and KCET Redefine Control Flow Integrity in the Windows Kernel.pdf2025-12-19 20:41 2.6M
[   ]David Brauchler III_When Guardrails Aren't Enough Reinventing Agentic AI Security With Architectural Controls.pdf2025-12-19 20:41 1.5M
[   ]Deral Heiland&Carlota Bindner_Weaponization of Cellular Based IoT Technology – Leveraging Smart Devices to Gain a Foothold.pdf2025-12-19 20:41 3.4M
[   ]Dirk-jan Mollema_Advanced Active Directory to Entra ID Lateral Movement Techniques.pdf2025-12-19 20:41 5.0M
[   ]Estelle Ruellan&Olivier Bilodeau_Hackers Dropping Mid-Heist Selfies LLM Identifies Information Stealer Infection Vector and Extracts IoCs.pdf2025-12-19 20:41 13M
[   ]Felix Eberstaller&Bernhard Rader&Sebastian Ranftl_Tracking the Tractors Analyzing Smart Farming Automation Systems for Fun and Profit.pdf2025-12-19 20:41 5.6M
[   ]Fengyu Liu&YouKun Shi&Tian Chen&Bocheng Xiang&Junyao He&Qi Li&Guangliang Yang&Yuan Zhang&Min Yang_Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications.pdf2025-12-19 20:41 3.5M
[   ]Fikret Garipay_Bypassing PQC Signature Verification with Fault Injection Dilithium, XMSS, SPHINCS+.pdf2025-12-19 20:41 2.3M
[   ]Garrett Foster_Clustered Points of Failure - Attacking Windows Server Failover Clusters.pdf2025-12-19 20:41 21M
[text]Garrett Foster_Clustered Points of Failure - Attacking Windows Server Failover Clusters_TOOLS.txt2025-12-19 20:41 118
[   ]Haakon Gulbrandsrud_Azure's Weakest Link How API Connections Spill Secrets.pdf2025-12-19 20:41 4.1M
[   ]Hayato Kimura&Ryoma Ito&Kazuhiko Minematsu&Shogo Shiraki&Takanori Isobe_Not Sealed Practical Attacks on Nostr, a Decentralized Censorship-Resistant Protocol.pdf2025-12-19 20:41 6.0M
[   ]Ibrahim El-sayed_Decoding Signal Understanding the Real Privacy Guarantees of E2EE.pdf2025-12-19 20:41 13M
[   ]Itay Ravia_Smashing Model Scanners Advanced Bypass Techniques and a Novel Detection Approach.pdf2025-12-19 20:41 3.0M
[   ]James Kettle_HTTP1.1 Must Die! The Desync Endgame.pdf2025-12-19 20:41 1.1M
[   ]James Kettle_HTTP1.1 Must Die! The Desync Endgame_WP.pdf2025-12-19 20:41 915K
[   ]Ji'an Zhou&Li'shuo Song_Safe Harbor or Hostile Waters Unveiling the Hidden Perils of the TorchScript Engine in PyTorch.pdf2025-12-19 20:41 18M
[   ]Jiashuo Liang&Guancheng Li_Universal and Context-Independent Triggers for Precise Control of LLM Outputs.pdf2025-12-19 20:41 3.3M
[   ]Jietao Yang_Booting into Breaches Hunting Windows SecureBoot's Remote Attack Surfaces.pdf2025-12-19 20:41 13M
[   ]Kaixuan Luo&Xianbo Wang&Adonis Fung&Yanxiang Bi&Wing Cheong Lau_Back to the Future Hacking and Securing Connection-based OAuth Architectures in Agentic AI and Integration Platforms.pdf2025-12-19 20:41 13M
[   ]Kazuki Matsuo_Shade BIOS Unleashing the Full Stealth of UEFI Malware.pdf2025-12-19 20:41 2.1M
[   ]Koh Nakagawa_XUnprotect Reverse Engineering macOS XProtect Remediator.pdf2025-12-19 20:41 6.4M
[text]Koh Nakagawa_XUnprotect Reverse Engineering macOS XProtect Remediator_TOOLS.txt2025-12-19 20:41 65
[   ]Kyle Avery_Training Specialist Models Automating Malware Development.pdf2025-12-19 20:41 734K
[   ]Lance Cain&Daniel Mayer_Leveraging Jamf for Red Teaming in Enterprise Environments.pdf2025-12-19 20:41 1.6M
[   ]Lukas Maar&Lukas Giner_Derandomizing the Location of Security-Critical Kernel Objects in the Linux Kernel.pdf2025-12-19 20:41 12M
[   ]Marco Casagrande&Daniele Antonioli_E-Trojans Ransomware, Tracking, DoS, and Data Leaks on Xiaomi Electric Scooters.pdf2025-12-19 20:41 2.8M
[   ]Marco Casagrande&Daniele Antonioli_E-Trojans Ransomware, Tracking, DoS, and Data Leaks on Xiaomi Electric Scooters_WP.pdf2025-12-19 20:41 5.0M
[   ]Marcos Bajo&Christian Rossow_Coroutine Frame-Oriented Programming Breaking Control Flow Integrity by Abusing Modern C++.pdf2025-12-19 20:41 9.7M
[   ]Marius Muench&Sam Collins&Tom Chothia_Watching the Watchers Exploring and Testing Defenses of Anti-Cheat Systems.pdf2025-12-19 20:41 7.8M
[   ]Morgan Hervé-Mignucci_Digital Dominoes Scanning the Internet to Expose Systemic Cyber Risk.pdf2025-12-19 20:41 11M
[   ]Naor Haziz_ECS-cape – Hijacking IAM Privileges in Amazon ECS.pdf2025-12-19 20:41 5.1M
[text]Naor Haziz_ECS-cape – Hijacking IAM Privileges in Amazon ECS_tools.txt2025-12-19 20:41 36
[   ]Neophytos Christou&Andreas Kellas_QUACK Hindering Deserialization Attacks via Static Duck Typing.pdf2025-12-19 20:41 3.4M
[   ]Noam Moshe_Turning Camera Surveillance on its Axis.pdf2025-12-19 20:41 4.6M
[text]not_in_list.txt2025-12-19 20:41 4.8K
[archive]Olaf Hartong_I'm in Your Logs Now, Deceiving Your Analysts and Blinding Your EDR_Compressed.7z2025-12-19 20:41 24M
[   ]Philip Young&Chad Rikansrud_Unix Underworld Tales from the Dark Side of zOS.pdf2025-12-19 20:41 11M
[   ]Pinji Chen&Jianjun Chen&Qi Wang&Mingming Zhang&Haixin Duan_Cross-Origin Web Attacks via HTTP2 Server Push and Signed HTTP Exchange.pdf2025-12-19 20:41 2.1M
[   ]Pinji Chen&Jianjun Chen&Qi Wang&Mingming Zhang&Haixin Duan_Cross-Origin Web Attacks via HTTP2 Server Push and Signed HTTP Exchange_WP.pdf2025-12-19 20:41 1.2M
[   ]Qibo Shi&Victor V&Wei Xiao&Zhiniang Peng_Diving into Windows HTTP Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services.pdf2025-12-19 20:41 2.7M
[   ]Qinrun Dai&Yifei Xie_BinWhisper LLM-Driven Reasoning for Automated Vulnerability Discovery Behind Hall-of-Fame.pdf2025-12-19 20:41 1.5M
[   ]Rama Hoetzlein_Protecting Small Organizations in the Era of AI Bots.pdf2025-12-19 20:41 5.6M
[   ]Rebecca Lynch&Rich Harang_From Prompts to Pwns Exploiting and Securing AI Agents.pdf2025-12-19 20:41 6.1M
[   ]Renée Burton&Dave Mitchell&Christopher Kim_No Hoodies Here Organized Crime in AdTech.pdf2025-12-19 20:41 17M
[   ]Rex Guo&Khang Nguyen_Death by Noise Abusing Alert Fatigue to Bypass the SOC (EDR Edition).pdf2025-12-19 20:41 1.8M
[   ]Ryan Barnett&Isabella Barnett_Lost in Translation Exploiting Unicode Normalization.pdf2025-12-19 20:41 4.5M
[   ]Salvatore Gariuolo_Smart Charging, Smarter Hackers The Unseen Risks of ISO 15118.pdf2025-12-19 20:41 1.7M
[   ]Sandro Rüegge&Johannes Wikner_Racing for Privilege Leaking Privileged Memory From Any Intel System Using a Microarchitectural Race Condition.pdf2025-12-19 20:41 5.4M
[text]Sandro Rüegge&Johannes Wikner_Racing for Privilege Leaking Privileged Memory From Any Intel System Using a Microarchitectural Race Condition_TOOLS.txt2025-12-19 20:41 36
[   ]Sandro Rüegge&Johannes Wikner_Racing for Privilege Leaking Privileged Memory From Any Intel System Using a Microarchitectural Race Condition_WP.pdf2025-12-19 20:41 534K
[   ]Sasha Zyuzin&Ruikai Peng_Thinking Outside the Sink How Tree-of-AST Redefines the Boundaries of Dataflow Analysis_Compressed.pdf2025-12-19 20:41 23M
[   ]Shu-Hao Tung_From Spoofing to Tunneling New Red Team's Networking Techniques for Initial Access and Evasion.pdf2025-12-19 20:41 5.0M
[   ]Shu-Hao Tung_From Spoofing to Tunneling New Red Team's Networking Techniques for Initial Access and Evasion_wp.pdf2025-12-19 20:41 3.4M
[   ]Sid Rao&Gabriela Sonkeri&Amel Bourdoucen&Janne Lindqvist_Lost & Found The Hidden Risks of Account Recovery in a Passwordless Future.pdf2025-12-19 20:41 2.7M
[text]Sid Rao&Gabriela Sonkeri&Amel Bourdoucen&Janne Lindqvist_Lost & Found The Hidden Risks of Account Recovery in a Passwordless Future_TOOLS.txt2025-12-19 20:41 87
[   ]Sid Rao&Gabriela Sonkeri&Amel Bourdoucen&Janne Lindqvist_Lost & Found The Hidden Risks of Account Recovery in a Passwordless Future_WP.pdf2025-12-19 20:41 367K
[   ]Tianchang Yang&Kai Tu&Syed Md Mukit Rashid&Ali Ranjbar&Gang Tan&Syed Rafiul Hussain_Open RAN, Open Risk Uncovering Threats and Exposing Vulnerabilities in Next-Gen Cellular RAN.pdf2025-12-19 20:41 3.8M
[   ]Tien-Chih Lin&Wei Chieh Chao&Zhao-Min Chen_Pay Attention to the Clue Clue-Driven Reverse Engineering by LLM in Real-World Malware Analysis.pdf2025-12-19 20:41 7.4M
[text]Tien-Chih Lin&Wei Chieh Chao&Zhao-Min Chen_Pay Attention to the Clue Clue-Driven Reverse Engineering by LLM in Real-World Malware Analysis_tools.txt2025-12-19 20:41 42
[   ]Tod Beardsley_Vulnerability Haruspicy Picking Out Risk Signals from Scoring System Entrails.pdf2025-12-19 20:41 4.4M
[   ]Tod Beardsley_Vulnerability Haruspicy Picking Out Risk Signals from Scoring System Entrails_WP.pdf2025-12-19 20:41 4.2M
[   ]Tom Tervoort_No VPN Needed Cryptographic Attacks Against the OPC UA Protocol.pdf2025-12-19 20:41 4.3M
[text]Tom Tervoort_No VPN Needed Cryptographic Attacks Against the OPC UA Protocol_TOOLS.txt2025-12-19 20:41 37
[   ]Tom Tervoort_No VPN Needed Cryptographic Attacks Against the OPC UA Protocol_WP.pdf2025-12-19 20:41 710K
[   ]Vaisha Bernard_Consent & Compromise Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications.pdf2025-12-19 20:41 5.2M
[   ]Varun Sharma&Ashish Kurmi_When 'Changed Files' Changed Everything Uncovering and Responding to the tj-actions Supply Chain Breach.pdf2025-12-19 20:41 5.6M
[   ]Varun Sharma&Ashish Kurmi_When 'Changed Files' Changed Everything Uncovering and Responding to the tj-actions Supply Chain Breach_WP.pdf2025-12-19 20:41 828K
[   ]Vedang Parasnis_Kernel-Enforced DNS Exfiltration Security Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale.pdf2025-12-19 20:41 2.9M
[   ]Vedang Parasnis_Kernel-Enforced DNS Exfiltration Security Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale_WP.pdf2025-12-19 20:41 2.9M
[   ]Xiaochen Wang&Yiping Liu&Xiaoman Wang&Cong Cheng_LLMDYara LLMs-Driven Automated YARA Rules Generation with Explainable File Features and DNAHash.pdf2025-12-19 20:41 6.0M
[   ]Yoav Magid_AppleStorm - Unmasking the Privacy Risks of Apple Intelligence.pdf2025-12-19 20:41 2.5M
[text]Yoav Magid_AppleStorm - Unmasking the Privacy Risks of Apple Intelligence_tools.txt2025-12-19 20:41 46
[   ]Yuan Luo&Zhaojun Chen&Yi Sun&Rhettxie Rhettxie_More Flows, More Bugs Empowering SAST with LLMs and Customized DFA.pdf2025-12-19 20:41 6.4M
[   ]Yuhao Jiang&Xinlei Ying&Ziming Zhang_Dark Corners How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years.pdf2025-12-19 20:41 2.5M
[   ]Yu Wang&Weiteng Chen_Dead Pixel Detected - A Security Assessment of Apple's Graphics Subsystem.pdf2025-12-19 20:41 6.0M
[   ]Zhisheng Hu&Shanit Gupta&Cooper de Nicola_Adversarial Fuzzer for Teleoperation Commands Evaluating Autonomous Vehicle Resilience.pdf2025-12-19 20:41 6.8M