Showing 15 results
DEF CON 33 Recon Village - OSINT & Modern Recon Uncover Global VPN Infrastructure - Vladimir Tokarev
39:53
Science & Technologyresearch-presentationtechnical-deep-divewindows
DEF CON 33 - 7 Vulns in 7 Days - Breaking Bloatware Faster Than It’s Built - Leon 'leonjza' Jacobs
39:56
Science & Technologyresearch-presentationpracticalwindows
One Bug to Rule Them All: Stably Exploiting a Preauth RCE Vulnerability on Windows Server 2025
22:15
Travel & Eventsresearch-presentationtechnical-deep-divewindows-server-2025
A Journey into Advanced Theoretical Reverse Engineering
35:33
Travel & Eventsresearch-presentationtechnical-deep-divequalcomm
Locknote: Highlights & Key Takeaways from Black Hat Asia 2025
38:56
Travel & Eventseducationalhybridblack-hat
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
45:07
Travel & Eventsresearch-presentationtechnical-deep-diveautomotive
Utilizing AI Models to Conceal and Extract Commands in C2 Images
21:03
Travel & Eventsresearch-presentationhybridai
KernelSnitch: Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage
30:49
Travel & Eventsresearch-presentationhybridlinux
Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM
36:36
Travel & Eventsresearch-presentationhybridwasm
(Mis)adventures with Copilot+: Attacking and Exploiting Windows NPU Drivers
35:39
Travel & Eventsresearch-presentationtechnical-deep-divewindows-11
DEF CON 33 - One Modem to Brick Them All -Vulns in EV Charging Comms - Jan Berens, Marcell Szakaly
43:23
Science & Technologyresearch-presentationhybridev-charging
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
32:28
Travel & Eventsresearch-presentationhybridlinux-kernel
Double Tap at the Blackbox: Hacking a Car Remotely Twice with MiTM
29:53
Travel & Eventsresearch-presentationhybridautomotive
Bridging the Gap: Type Confusion and Boundary Vulnerabilities Between WebAssembly and JavaScript
40:33
Travel & Eventsresearch-presentationtechnical-deep-divev8
vCenter Lost: How the DCERPC Vulnerabilities Changed the Fate of ESXi
30:24
Travel & Eventsresearch-presentationtechnical-deep-divevcenter
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in