NCC Group Research Blog
Flash local-with-filesystem Bypass in navigateToURL
10 months ago
Flash security restrictions bypass: File upload by URLRequest
10 months ago
firstexecution
10 months ago
Five Essential Machine Learning Security Papers
10 months ago
Finding the weak link in binaries
10 months ago
Firmware Rootkits: The Threat to the Enterprise
10 months ago
File Fuzzers
10 months ago
Finding and Exploiting .NET Remoting over HTTP using Deserialisation
10 months ago
Fat-Finger
10 months ago
Faux Disk Encryption: Realities of Secure Storage On Mobile Devices
10 months ago
Extractor
10 months ago
Faster Modular Inversion and Legendre Symbol, and an X25519 Speed Record
10 months ago
Extending a Thinkst Canary to become an interactive honeypot
10 months ago
External Enumeration and Exploitation of Email and Web Security Solutions
10 months ago
Extracting the Payload from a CVE-2014-1761 RTF Document
10 months ago
Exporting non-exportable RSA keys
10 months ago
Exposing Vulnerabilities in Media Software
10 months ago
Exploring Prompt Injection Attacks
10 months ago
Exploring the Security & Privacy of Canada’s Digital Proof of Vaccination Programs
10 months ago
Checked
5 hours 59 minutes ago