HEXACON2023 - A 3-Year Tale of Hacking a Pwn2Own Target by Orange Tsai
HEXACON2023 - Exploiting Hardened .NET Deserialization by Piotr Bazydło
HEXACON2023 - The two-sided mirror by xerub
HEXACON2023 - An Avocado Nightmare by Stefan Schiller
HEXACON2023 - XORtigate: zero-effort, zero-expense, 0-day on Fortinet SSL VPN by Charles Fol
HEXACON2023 - Opening by Renaud Feil
HEXACON2023 - Finding and exploiting an old XNU logic bug by Eloi Benoist-Vanderbeken
HEXACON2023 - 9 Years of Overlooked MikroTik Pre-Auth RCE by NiNi
From Hexacon 2023 - A Demonstration of CVE-2022-47504: An RCE in SolarWinds NPM
HEXACON2023 - A Year Fuzzing XNU Mach IPC by Nguyen Vu Hoang
HEXACON2023 - Back to the Future with Platform Security by Krzysztof Okupski
HEXACON2023 - Bypassing the HVCI memory protection by Viviane Zwanger and Henning Braun
HEXACON2023 - Unveiling Hidden Paths by Junoh Lee and JeongOh Kyea
From Hexacon 2023 - A Demonstration of CVE-2023-32031: An RCE in Exchange Server
HEXACON2023 - Bug Tales: Life and Death in the Sahara by Seamus Burke & Aaron Willey
HEXACON2023 - Breaking Out of the Box by Thomas Imbert and Thomas Bouzerar
HEXACON2023 - Turning a Hyper-V cache miss into 200k cash by Leo Adrien
HEXACON2023 - Remotely exploiting an Antivirus engine by Simon Scannell
WinRAR 0day: CVE-2023-38831 Proof Of Concept (PoC)
Zyxel critical vulnerabilities in firewall and VPN devices | CVE-2023-33009 | CVE-2023-33010