Enhancing LLM Code Generation with RAG and AST-Based ChunkingResarcher: Ken Wong (Twitter/X: wwkenwong)Mar 6Mar 6
First Google Chrome v8 JIT bug bounty before Christmas 🎄.We will discuss about the bug later, and please stay tuned. Merry Christmas to everyone.Dec 19, 2024Dec 19, 2024
Toxic Pancake: Real-Life Software Supply Chain Attack Op. 1{Johnny Wong, Anthony Lai, Jack Man} Security ResearcherDec 10, 2024Dec 10, 2024
AI-Powered Programming — A little helpAI tools like ChatGPT, Claude 3.5 Sonnet are excellent programming assistance. However, long conversations can lead to browser memory…Jul 12, 2024Jul 12, 2024
Journey to RansomSOC Patent: From Zero to HeroResearchers: Darkfloyd, Ozetta, AlanH0, wwwkenwongApr 12, 2024Apr 12, 2024
How easy deepfake can join your Zoom and Google meetingResearchers: {alanh0, darkfloyd}Feb 20, 20241Feb 20, 20241
Retro GamingLet’s have some relaxing time :) Many of us (uncles) grew up with video games like Nintendo, Sega, Super Nintendo, PC Engine, Gameboy etc…Jan 15, 2024Jan 15, 2024
Root Cause Analysis of Maglev Graph Builder Bug or Vulnerability?!@darkfloyd1014 and @wwkenwongDec 29, 2023Dec 29, 2023
Technical Analysis of 送達 AppResearchers: {alanh0, Byron, Darkfloyd, Jackson}Nov 23, 20231Nov 23, 20231
Experimenting with Signal Capturing: A Flipper Zero StoryTwitter: @Darkfloyd1014Nov 10, 2023Nov 10, 2023
Teensy Old TrickThe following video is a simple demo, a victim picks up a badUSB, then the badUSB pretends to be a keyboard, executing commands and connect…Apr 27, 2023Apr 27, 2023