Duplicating Restricted Mechanical Keys
Evil eBPF In-Depth: Practical Abuses of an In-Kernel Bytecode Runtime
API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs Volumes
Practical Key Search Attacks Against Modern Symmetric Ciphers
Relaying Credentials Has Never Been Easier: How to Easily Bypass the Latest NTLM Relay Mitigations
The JOP ROCKET: A Supremely Wicked Tool for JOP Gadget Discovery, or What to Do If ROP Is Too Easy
Re: What's up Johnny? – Covert Content Attacks on Email End-to-End Encryption
EDR Is Coming; Hide Yo Sh!t
Meticulously Modern Mobile Manipulations
Zombie Ant Farm: Practical Tips for Playing Hide and Seek with Linux EDRs
SSO Wars: The Token Menace
Next Generation Process Emulation with Binee
.NET Malware Threats: Internals And Reversing
Vacuum Cleaning Security—Pinky and the Brain Edition
Apache Solr Injection
Your Secret Files Are Mine: Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors
Say Cheese - How I Ransomwared Your DSLR Camera
Help Me, Vulnerabilities. You're My Only Hope
Want Strong Isolation? Just Reset Your Processor
Contests Awards Ceremony