Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.
Black Hat USA 2014 - CloudBots - Harvesting Crypto Coins like a Botnet Farmer
In this presentation, we explore how to (ab)use free trials to get access to vast amounts of computing power, storage, and pre-made hacking environments.
HOPE X (2014) - Rickrolling your neighbors with Google Chromecast
Bsides LV 2014 - Untwisting The Mersenne Twister: How I killed the PRNG
RickMote Controller - Hijacking TVs via Google Chromecast
August: Built-in Security in IoT Devices
Secured a new voice-enabled speaker at launch by integrating security testing into every stage of development.
ToorCon 15 (2013) - Rickrolling your neighbors with Google Chromecast
RFID Hacking: Over-the-head Move - Stealing Badges w Tastic RFID Thief
Microsoft BlueHat v8 - Real World Code Review
Mozilla Security Blog - Threat Modeling Using Trike
UAT - What Palpatine Can Teach About Pentesters
BayThreat - Where To Start When Securing A Startup?
Black Hat USA 2005 - Catch Me If You Can
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.