Mathy Vanhoef
The SSID Confusion Attack: Common Misconceptions
Making the Cloudflare WARP VPN leak DNS requests
FragAttacks: Clarifying Some Aspects
Providing source code when submitting papers: how to give anonymous but protected access
Protecting Wi-Fi Beacons from Outsider Forgeries
Riving a router stuck in an infinite reboot loop
Accessing and Inspecting Draft IEEE Standards
WPA3: A Missed Opportunity
unKRACK: Mitigating Future WPA2 Vulnerabilities
WPA3: Technical Details and Discussion
Windows 10 Lock Screen: Abusing the Network UI for Backdoors (and how to disable it)
How MAC Address Randomization Works on Windows 10
Advanced WiFi Attacks Using Commodity Hardware
Solving CSAW challenge Wyvern (rev-500) using afl-fuzz
Codegate 2015 Good_Crypto: Advanced WEP Cracking
CSAW 2014: xorcise challenge
ApBleed: Heartbleed over WPA1/2 Enterprise
Reversing and Exploiting ARM Binaries: rwthCTF Trafman
Unmasking a Spoofed MAC Address (CVE-2013-4579)
Transparent Interception of Android HTTPS Traffic
UCSB iCTF: Hacking Nuclear Plants and Pwning ASLR/NX
Understanding the Heap & Exploiting Heap Overflows
Common Pitfalls When Writing Exploits
Compat-Wireless Injection Patch for Aircrack-ng
Secrets of Reverse Engineering: Flaws in Cryptex