NCC Group Research Blog
Public Report – BLST Cryptographic Implementation Review
1 year ago
Public Report – Caliptra Security Assessment
1 year ago
Public Report – Filecoin Bellman and BLS Signatures Cryptographic Review
1 year ago
Public Report – Android Cloud Backup/Restore
1 year ago
Public Report – Coda Cryptographic Review
1 year ago
Public cloud
1 year ago
Proxy Re-Encryption Protocol: IronCore Public Report
1 year ago
PRTG Network Monitor Command injection
1 year ago
Protecting stored cardholder data (an unofficial supplement to PCI DSS V3.0)
1 year ago
ProxMon
1 year ago
ProxMon: Automating Web Application Penetration Testing
1 year ago
Project Triforce: Run AFL on Everything!
1 year ago
Properly Signed Certificates on CPE Devices
1 year ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 8: Development of Prototype #4 – Building on Takaesu’s Approach with Focus on XSS
1 year ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 9: Adventures with Expert Systems
1 year ago
Project Bishop: Clustering Web Pages
1 year ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 6: Development of Prototype #2 – Creating a SQLi PoC
1 year ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 7: Development of Prototype #3 – Adventures in Anomaly Detection
1 year ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 4: Architecture and Design
1 year ago
Checked
8 hours 42 minutes ago