Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.
Game Over, Man! – Reversing Video Games to Create an Unbeatable AI Player
If You Can't Break Crypto, Break the Client
Bypass Surgery - Abusing CDNs with SSRF Flash and DNS
RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID
Brink's Smart Safe Hacking
It’s possible for a thief to plug a USB drive into Brink’s CompuSafe Galileo, automate hacking the safe, and steal the cash inside. Our video explains this exploit in under 60 seconds.
AirDroid Exploit Demo
Black Hat USA 2014 - CloudBots - Harvesting Crypto Coins like a Botnet Farmer
In this presentation, we explore how to (ab)use free trials to get access to vast amounts of computing power, storage, and pre-made hacking environments.
HOPE X (2014) - Rickrolling your neighbors with Google Chromecast
Bsides LV 2014 - Untwisting The Mersenne Twister: How I killed the PRNG
RickMote Controller - Hijacking TVs via Google Chromecast
August: Built-in Security in IoT Devices
Secured a new voice-enabled speaker at launch by integrating security testing into every stage of development.
ToorCon 15 (2013) - Rickrolling your neighbors with Google Chromecast
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.