NCC Group Research Blog
Paper: Thematic for Success in Real-World Offensive Cyber Operations – How to make threat actors work harder and fail more often
1 year ago
Pairing over BLS12-381, Part 1: Fields
1 year ago
Pairing over BLS12-381, Part 2: Curves
1 year ago
Package Play
1 year ago
Padding the struct: How a compiler optimization can disclose stack memory
1 year ago
OSX afpserver remote code execution
1 year ago
Overview of Modern Memory Security Concerns
1 year ago
Owning the Virgin Media Hub 3.0: The perfect place for a backdoor
1 year ago
OS X Lion USB Hub Class Descriptor Arbitrary Code Execution
1 year ago
osquery Application Security Assessment Public Report
1 year ago
Order Details Screens and PII
1 year ago
OS X 10.6.6 Camera Raw Library Memory Corruption
1 year ago
Oracle Retail Integration Bus Manager Directory Traversal
1 year ago
Oracle Retail Invoice Manager SQL Injection
1 year ago
Oracle Hyperion 11 Directory Traversal
1 year ago
Oracle Java Installer Adds a System Path Which is Writable by All
1 year ago
Oracle Passwords and OraBrute
1 year ago
Oracle Forensics Part 7 Using the Oracle System Change Number in Forensic Investigations
1 year ago
Oracle Gridengine sgepasswd Buffer Overflow
1 year ago
Checked
41 minutes 25 seconds ago