NCC Group Research Blog
Practical Machine Learning for Random (Filename) Detection
9 months 2 weeks ago
Practical SME security on a shoestring
9 months 2 weeks ago
Premium Content Gateway
9 months 2 weeks ago
Potential false redirection of web site content in Internet in SAP NetWeaver web applications
9 months 2 weeks ago
Practical Considerations of Right-to-Repair Legislation
9 months 2 weeks ago
Porting the Misfortune Cookie Exploit: A Look into Router Exploitation Using the TD-8817
9 months 2 weeks ago
Post-exploiting a compromised etcd – Full control over the cluster and its nodes
9 months 2 weeks ago
Post-quantum cryptography overview
9 months 2 weeks ago
Popping Blisters for research: An overview of past payloads and exploring recent developments
9 months 2 weeks ago
port-scan-automation
9 months 2 weeks ago
Pointer Sequence Reverser (PSR)
9 months 2 weeks ago
Poison Ivy string decryption
9 months 2 weeks ago
Pip3line
9 months 2 weeks ago
Pip3line – The Swiss Army Knife of Byte Manipulation
9 months 2 weeks ago
POC2021 – Pwning the Windows 10 Kernel with NTFS and WNF Slides
9 months 2 weeks ago
Phishing Mitigations: Configuring Microsoft Exchange to Clearly Identify External Emails
9 months 2 weeks ago
Phishing Stories
9 months 2 weeks ago
Peeling back the layers on defence in depth…knowing your onions
9 months 2 weeks ago
Perfect Forward Security
9 months 2 weeks ago
Checked
4 hours 43 minutes ago