Aggregator
Forensic Fuzzing Tools
1 year 9 months ago
Fix Bounty
1 year 9 months ago
Flash local-with-filesystem Bypass in navigateToURL
1 year 9 months ago
Flash security restrictions bypass: File upload by URLRequest
1 year 9 months ago
firstexecution
1 year 9 months ago
Five Essential Machine Learning Security Papers
1 year 9 months ago
Finding the weak link in binaries
1 year 9 months ago
Firmware Rootkits: The Threat to the Enterprise
1 year 9 months ago
File Fuzzers
1 year 9 months ago
Finding and Exploiting .NET Remoting over HTTP using Deserialisation
1 year 9 months ago
Fat-Finger
1 year 9 months ago
Faux Disk Encryption: Realities of Secure Storage On Mobile Devices
1 year 9 months ago
Extractor
1 year 9 months ago
Faster Modular Inversion and Legendre Symbol, and an X25519 Speed Record
1 year 9 months ago
Extending a Thinkst Canary to become an interactive honeypot
1 year 9 months ago
External Enumeration and Exploitation of Email and Web Security Solutions
1 year 9 months ago
Extracting the Payload from a CVE-2014-1761 RTF Document
1 year 9 months ago
Exporting non-exportable RSA keys
1 year 9 months ago
Exposing Vulnerabilities in Media Software
1 year 9 months ago