NCC Group Research Blog
PDF Form Filling and Flattening Tool Buffer Overflow
9 months 1 week ago
PeachFarmer
9 months 1 week ago
Payment Card Industry Data Security Standard (PCI DSS) A Navigation and Explanation of Changes from v2.0 to v3.0
9 months 1 week ago
Past, Present and Future of Effective C
9 months 1 week ago
Password and brute-force mitigation policies
9 months 1 week ago
Passive Information Gathering – The Analysis of Leaked Network Security Information
9 months 1 week ago
Paradoxical Compression with Verifiable Delay Functions
9 months 1 week ago
Passive Decryption of Ethereum Peer-to-Peer Traffic
9 months 1 week ago
Pairing over BLS12-381, Part 3: Pairing!
9 months 1 week ago
Paper: Thematic for Success in Real-World Offensive Cyber Operations – How to make threat actors work harder and fail more often
9 months 1 week ago
Pairing over BLS12-381, Part 1: Fields
9 months 1 week ago
Pairing over BLS12-381, Part 2: Curves
9 months 1 week ago
Package Play
9 months 1 week ago
Padding the struct: How a compiler optimization can disclose stack memory
9 months 1 week ago
OSX afpserver remote code execution
9 months 1 week ago
Overview of Modern Memory Security Concerns
9 months 1 week ago
Owning the Virgin Media Hub 3.0: The perfect place for a backdoor
9 months 1 week ago
OS X Lion USB Hub Class Descriptor Arbitrary Code Execution
9 months 1 week ago
osquery Application Security Assessment Public Report
9 months 1 week ago
Checked
1 hour 3 minutes ago