[ICO]NameLast modifiedSize
[parent]Parent Directory  -
[   ]An-Jie Yang_Proxying to Kernel Streaming vulnerabilities from the Windows Kernel.pdf2025-12-19 20:41 9.7M
[   ]andrew calvano & octavian guzu & Ryan Hall_Defense through Offense Building a 1-click Calling Exploit targeting Messenger for Android.pdf2025-12-19 20:41 4.1M
[   ]Clem1_Caught in the wild, past, present and future.pdf2025-12-19 20:41 7.7M
[   ]David Berard & Thomas Imbert_0-click RCE on Tesla Model 3 through TPMS Sensors.pdf2025-12-19 20:41 6.3M
[   ]Enrique E Nissim & Krzysztof Okupski_AMD Sinkclose Universal Ring -2 Privilege Escalation.pdf2025-12-19 20:41 3.0M
[   ]Ginoah_Pwning Blockchain for Fun and Profit Exploiting an RCE Vulnerability in the Solana validator.pdf2025-12-19 20:41 11M
[   ]Junoh Lee & Gwangun Jung_Guest Revolution Our Story of Compromising the Host Kernel from the VMware Guest.pdf2025-12-19 20:41 1.3M
[   ]Mikhail Evdokimov_0-click RCE on the IVI component Pwn2Own Automotive edition.pdf2025-12-19 20:41 9.8M
[text]Not_in_list.txt2025-12-19 20:41 220
[text]Pedro Pinto_Unleashing a 0day Pivoting Capabilities and Conquering the Linux Kernel.txt2025-12-19 20:41 175
[   ]Sergei Volokitin_HSM Security and Exploitation of USB over SPI bug.pdf2025-12-19 20:41 1.7M
[   ]Stefan Schiller_Exploiting File Writes in Hardened Environments - From HTTP Request to ROP Chain in Node.js.pdf2025-12-19 20:41 2.5M
[   ]Thomas Dubier_Tales of a RCE in a video game_Compressed.pdf2025-12-19 20:41 4.1M
[   ]Wongi Lee & Mingi Cho_Utilizing Cross-CPU Allocation to Exploit Preempt-Disabled Linux Kernel.pdf2025-12-19 20:41 11M