Aggregator
Exploring the Security & Privacy of Canada’s Digital Proof of Vaccination Programs
9 months ago
Exploring Verifiable Random Functions in Code
9 months ago
Exploring macOS Calendar Alerts: Part 2 – Exfiltrating data (CVE-2020-3882)
9 months ago
Exploring Overfitting Risks in Large Language Models
9 months ago
Exploring DeepFake Capabilities & Mitigation Strategies with University College London
9 months ago
Exploring macOS Calendar Alerts: Part 1 – Attempting to execute code
9 months ago
Exploiting Security Gateways Via Web Interfaces
9 months ago
Exploiting the Sudo Baron Samedit vulnerability (CVE-2021-3156) on VMWare vCenter Server 7.0
9 months ago
Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE-2015-0057) bug on both 32-bit and 64-bit
9 months ago
Exploiting Rich Content
9 months ago
Exploiting Samba CVE-2015-0240 on Ubuntu 12.04 and Debian 7 32-bit
9 months ago
Exploiting Noisy Oracles with Bayesian Inference
9 months ago
Exploiting PL/SQL Injection Flaws with only CREATE SESSION Privileges
9 months ago
Exploiting CVE-2015-2426, and How I Ported it to a Recent Windows 8.1 64-bit
9 months ago
Exploiting MS15-061 Use-After-Free Windows Kernel Vulnerability
9 months ago
Exploiting CVE-2014-0282
9 months ago
Exploiting CVE-2014-0282 (1)
9 months ago
Experiments in Extending Thinkst Canary – Part 1
9 months ago
Exploit mitigations: keeping up with evolving and complex software/hardware
9 months ago