Showing 10 results
DEF CON 33  Recon Village - Pretty Good Pivot - Simwindie
37:50
Science & Technologyresearch-presentationhybridpgp
JDD: In-depth Mining of Java Deserialization Gadget Chains
37:13
Travel & Eventsresearch-presentationhybridjava
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
45:07
Travel & Eventsresearch-presentationtechnical-deep-diveautomotive
Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine
30:13
Travel & Eventsresearch-presentationhybridbluetooth
The Problems of Embedded Python in Excel, or How to Excel in Pwning Pandas
40:55
Travel & Eventsresearch-presentationhybridmicrosoft-excel
KernelSnitch: Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage
30:49
Travel & Eventsresearch-presentationhybridlinux
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
32:28
Travel & Eventsresearch-presentationhybridlinux-kernel
The Illusion of Isolation: How Isolation Failures in CI/CD Servers Lead to RCE and Privacy Risks
35:56
Travel & Eventsresearch-presentationtechnical-deep-diveci-cd
The Oversights Under the Flow: Discovering the Vulnerable Tooling Suites From Azure MLOps
47:09
Travel & Eventsresearch-presentationhybridazure
vCenter Lost: How the DCERPC Vulnerabilities Changed the Fate of ESXi
30:24
Travel & Eventsresearch-presentationtechnical-deep-divevcenter
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in