Whitepaper called Access Denied - A Guide For Code Breakers.
3d28c0b73d3a1ca635df5eae7c8f884e0751112cf1e4fc7784e166799a7264a1
Whitepaper called Alternative JVM Exploit - Exploiting JVM On Chrome.
7e227fd602969d05eea978eafa822da092f7099bb8ce85f5bd1026d9c8aa97df
Whitepaper called Evading AV Signatures - Derailing Antivirus.
ab9feb9da9c02c06044b5b0d1cc8868bbfe101a8fbdb7ac6fa258fa8759c7d62
Whitepaper called Fusion of Xploits - Multiplexing Exploitation.
049bfce912a54cdb9f5a41be0137e97696d8f5d1a4d88376f022003b318eceb2