NCC Group Research Blog
Azucar
1 year ago
Back in Black: Unlocking a LockBit 3.0 Ransomware Attack
1 year ago
AWS environment security assessment with Scout2
1 year ago
AWS Inventory: A tool for mapping AWS resources
1 year ago
Avoiding Pitfalls Developing with Electron
1 year ago
Automating extraction from malware and recent campaign analysis
1 year ago
AutoRepeater: Automated HTTP Request Repeating With Burp Suite
1 year ago
Autochrome
1 year ago
Automated enumeration of email filtering solutions
1 year ago
Automated Reverse Engineering of Relationships Between Data Structures in C++ Binaries
1 year ago
Aurora Response Recommendations
1 year ago
Authorisation
1 year ago
Attacking Web Service Security: Message Oriented Madness, XML Worms and Web Service Security Sanity
1 year ago
Attacks on SSL
1 year ago
Auditing Enterprise Class Applications and Secure Containers on Android
1 year ago
AtHoc Toolbar
1 year ago
Attacking the Windows Kernel (Black Hat Las Vegas 2007)
1 year ago
Assessing Unikernel Security
1 year ago
AssetHook
1 year ago
Checked
11 hours 53 minutes ago