NCC Group Research Blog
Practical Machine Learning for Random (Filename) Detection
9 months ago
Practical SME security on a shoestring
9 months ago
Premium Content Gateway
9 months ago
Potential false redirection of web site content in Internet in SAP NetWeaver web applications
9 months ago
Practical Considerations of Right-to-Repair Legislation
9 months ago
Porting the Misfortune Cookie Exploit: A Look into Router Exploitation Using the TD-8817
9 months ago
Post-exploiting a compromised etcd – Full control over the cluster and its nodes
9 months ago
Post-quantum cryptography overview
9 months ago
Popping Blisters for research: An overview of past payloads and exploring recent developments
9 months ago
port-scan-automation
9 months ago
Pointer Sequence Reverser (PSR)
9 months ago
Poison Ivy string decryption
9 months ago
Pip3line
9 months ago
Pip3line – The Swiss Army Knife of Byte Manipulation
9 months ago
POC2021 – Pwning the Windows 10 Kernel with NTFS and WNF Slides
9 months ago
Phishing Mitigations: Configuring Microsoft Exchange to Clearly Identify External Emails
9 months ago
Phishing Stories
9 months ago
Peeling back the layers on defence in depth…knowing your onions
9 months ago
Perfect Forward Security
9 months ago
Checked
2 hours 32 minutes ago