NCC Group Research Blog
Secure Coding Rules for Java LiveLessons, Part 1
10 months 2 weeks ago
Secure Application Development on Facebook
10 months 2 weeks ago
Secure Coding in C and C++
10 months 2 weeks ago
Secure Coding in C and C++, 2nd Edition
10 months 2 weeks ago
SCOMplicated? – Decrypting SCOM “RunAs” credentials
10 months 2 weeks ago
Second-Order Code Injection Attacks
10 months 2 weeks ago
Scenester – A Small Tool for Cross-Platform Web Application
10 months 2 weeks ago
scenester
10 months 2 weeks ago
SAML Pummel
10 months 2 weeks ago
SAML XML Injection
10 months 2 weeks ago
Samba Andx Request Remote Code Execution
10 months 2 weeks ago
Samba on the BlackBerry PlayBook
10 months 2 weeks ago
Salesforce Security with Remote Working
10 months 2 weeks ago
Samba _netr_ServerPasswordSet Expoitability Analysis
10 months 2 weeks ago
Rustproofing Linux (Part 4/4 Shared Memory)
10 months 2 weeks ago
Ruxcon 2013 – Introspy Presentation Slides
10 months 2 weeks ago
Sakula: an adventure in DLL planting
10 months 2 weeks ago
Rustproofing Linux (Part 2/4 Race Conditions)
10 months 2 weeks ago
Rustproofing Linux (Part 3/4 Integer Overflows)
10 months 2 weeks ago
Checked
1 hour 42 minutes ago