NCC Group Research Blog
Popping Blisters for research: An overview of past payloads and exploring recent developments
4 months ago
port-scan-automation
4 months ago
Pointer Sequence Reverser (PSR)
4 months ago
Poison Ivy string decryption
4 months ago
Pip3line
4 months ago
Pip3line – The Swiss Army Knife of Byte Manipulation
4 months ago
POC2021 – Pwning the Windows 10 Kernel with NTFS and WNF Slides
4 months ago
Phishing Mitigations: Configuring Microsoft Exchange to Clearly Identify External Emails
4 months ago
Phishing Stories
4 months ago
Peeling back the layers on defence in depth…knowing your onions
4 months ago
Perfect Forward Security
4 months ago
PhanTap (Phantom Tap): Making networks spookier one packet at a time
4 months ago
PDF Form Filling and Flattening Tool Buffer Overflow
4 months ago
PeachFarmer
4 months ago
Payment Card Industry Data Security Standard (PCI DSS) A Navigation and Explanation of Changes from v2.0 to v3.0
4 months ago
Past, Present and Future of Effective C
4 months ago
Password and brute-force mitigation policies
4 months ago
Passive Information Gathering – The Analysis of Leaked Network Security Information
4 months ago
Paradoxical Compression with Verifiable Delay Functions
4 months ago
Checked
1 hour 44 minutes ago