Content List

  1. From Zero to Sixty – The Story of North Korea’s Rapid Ascent to Becoming a Global Cyber Superpower
  2. Finding Bugs Compiler Knows but Doesn’t Tell You-Dissecting Undefined Behavior Optimizations in LLVM
  3. Cross-Site Escape – Pwning macOS Safari Sandbox the Unusual Way
  4. Permission Mining in GCP
  5. Debug Resurrection on Nordic nRF52 Series
  6. Please Make a Dentist Appointment ASAP – Attacking IOBluetoothFamily HCI and Vendor-Specific Commands
  7. Bypassing NGAV for Fun and Profit
  8. Manufacturing Hardware Implants from Idea to Mass Production – A Hacker’s Journey
  9. How to Better Fuzz Windows 10 Directx Kernel at Present
  10. This is for the Pwners – Exploiting a WebKit 0-day in PlayStation 4
  11. Portable Data exFiltration – XSS for PDFs
  12. The Hunt for Major League IoT-ICS Threats – A Deep Dive into IoT Threat Terrain
  13. How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration
  14. IAM Concerned – OAuth Token Hijacking in Google Cloud (GCP)
  15. Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control
  16. Shield with Hole – New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy
  17. Jack-in-the-Cache – A New Code injection Technique through Modifying X86-to-ARM Translation Cache
  18. LadderLeak – Breaking ECDSA with Less than One Bit of Nonce Leakage
  19. FPs are Cheap. Show me the CVEs!
  20. BinTyper – Type Confusion Detection for C++ Binaries
  21. Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel
  22. POSWorld. Should You be Afraid of Hands-On Payment Devices
  23. Fingerprint-Jacking – Practical Fingerprint Authorization Hijacking in Android Apps
  24. Story of Jailbreaking iOS 13
  25. The Subtle Art of Chaining Headers – IKEv2 Attack Surface Case Study
  26. Design Pitfalls in Commercial Mini-Programs on Android and iOS
  27. efiXplorer – Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis
  28. Quantum Security and Cryptography – You Are (Probably) Doing it Wrong
  29. Effective Vulnerability Discovery with Machine Learning
  30. It’s not FINished – The Evolving Maturity in Ransomware Operations
  31. How Embedded TCP_IP Stacks Breed Critical Vulnerabilities
  32. My Ticks Don’t Lie – New Timing Attacks for Hypervisor Detection
  33. Hermes Attack – Steal DNN Models In AI Privatization Deployment Scenarios
  34. A New Hope – The One Last Chance to Save Your SSD Data
  35. Light Commands – Hacking Voice Assistants with Lasers
  36. Precursor – Towards Evidence-Based Trust in Hardware
  37. Hacking Government Cybersecurity

PASSWORD: ENCRYPTED123


Huzaifa bin mudasir

Huzaifa Bin Mudassair, a seasoned Website Developer with 5 years of professional experience, adeptly merges creative vision with technical prowess to deliver dynamic and impactful online solutions. Specializing in web development, I bring a proven track record of crafting engaging and functional websites that elevate brands and user experiences. Let's collaborate to transform your digital aspirations into reality.

0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *