NCC Group Research Blog
Ghidra nanoMIPS ISA module
10 months ago
Getting Shell with XAMLX Files
10 months ago
General Data Protection Regulation: Knowing your data
10 months ago
Getting per-user Conditional Access MFA status in Azure
10 months ago
G-Scout
10 months ago
Game Security
10 months ago
General Data Protection Regulation – are you ready?
10 months ago
Fuzzing USB devices using Frisbee Lite
10 months ago
Fuzzing RTSP to discover an exploitable vulnerability in VLC
10 months ago
Fuzzing the Easy Way Using Zulu
10 months ago
Fuzzing the Easy Way Using Zulu (1)
10 months ago
From ERMAC to Hook: Investigating the technical differences between two Android malware variants
10 months ago
Fuzzbox
10 months ago
FrisbeeLite
10 months ago
From CSV to CMD to qwerty
10 months ago
FPGAs: Security Through Obscurity?
10 months ago
Freddy: An extension for automatically identifying deserialisation issues in Java and .NET applications
10 months ago
Flubot: the evolution of a notorious Android Banking Malware
10 months ago
Forensic Fuzzing Tools
10 months ago
Checked
6 hours 37 minutes ago