NCC Group Research Blog
Finding the weak link in binaries
9 months ago
Firmware Rootkits: The Threat to the Enterprise
9 months ago
File Fuzzers
9 months ago
Finding and Exploiting .NET Remoting over HTTP using Deserialisation
9 months ago
Fat-Finger
9 months ago
Faux Disk Encryption: Realities of Secure Storage On Mobile Devices
9 months ago
Extractor
9 months ago
Faster Modular Inversion and Legendre Symbol, and an X25519 Speed Record
9 months ago
Extending a Thinkst Canary to become an interactive honeypot
9 months ago
External Enumeration and Exploitation of Email and Web Security Solutions
9 months ago
Extracting the Payload from a CVE-2014-1761 RTF Document
9 months ago
Exporting non-exportable RSA keys
9 months ago
Exposing Vulnerabilities in Media Software
9 months ago
Exploring Prompt Injection Attacks
9 months ago
Exploring the Security & Privacy of Canada’s Digital Proof of Vaccination Programs
9 months ago
Exploring Verifiable Random Functions in Code
9 months ago
Exploring macOS Calendar Alerts: Part 2 – Exfiltrating data (CVE-2020-3882)
9 months ago
Exploring Overfitting Risks in Large Language Models
9 months ago
Exploring DeepFake Capabilities & Mitigation Strategies with University College London
9 months ago
Checked
4 hours 31 minutes ago