BEEMKA / Electron Post-Exploitation When The Land Is Dry
Unpacking pkgs: A look inside macOS Installer packages and common security flaws
Using Machines to exploit Machines - harnessing AI to accelerate exploitation
Meltdown's Aftermath: Leveraging KVA Shadow To Bypass Security Protections
Neurosecurity: where Infosec meets Brain-machine Interface
Loki: Add a little chaos to your USB drive
From EK to DEK: An Analysis of Modern Document Exploit Kits
From email address to phone number
Virtual Breakpoints for x86_64
ROP with a 2nd Stack, or This Exploit is a Recursive Fibonacci Sequence Generator
At Your Service - Abusing the Service Workers Web API
State of DNS Rebinding - Attack & Prevention Techniques and the Singularity of Origin