NCC Group Research Blog
Freddy: An extension for automatically identifying deserialisation issues in Java and .NET applications
10 months 2 weeks ago
Flubot: the evolution of a notorious Android Banking Malware
10 months 2 weeks ago
Forensic Fuzzing Tools
10 months 2 weeks ago
Fix Bounty
10 months 2 weeks ago
Flash local-with-filesystem Bypass in navigateToURL
10 months 2 weeks ago
Flash security restrictions bypass: File upload by URLRequest
10 months 2 weeks ago
firstexecution
10 months 2 weeks ago
Five Essential Machine Learning Security Papers
10 months 2 weeks ago
Finding the weak link in binaries
10 months 2 weeks ago
Firmware Rootkits: The Threat to the Enterprise
10 months 2 weeks ago
File Fuzzers
10 months 2 weeks ago
Finding and Exploiting .NET Remoting over HTTP using Deserialisation
10 months 2 weeks ago
Fat-Finger
10 months 2 weeks ago
Faux Disk Encryption: Realities of Secure Storage On Mobile Devices
10 months 2 weeks ago
Extractor
10 months 2 weeks ago
Faster Modular Inversion and Legendre Symbol, and an X25519 Speed Record
10 months 2 weeks ago
Extending a Thinkst Canary to become an interactive honeypot
10 months 2 weeks ago
External Enumeration and Exploitation of Email and Web Security Solutions
10 months 2 weeks ago
Extracting the Payload from a CVE-2014-1761 RTF Document
10 months 2 weeks ago
Checked
2 hours 5 minutes ago