NCC Group Research Blog
Hacking the Extensible Firmware Interface
4 months ago
Hacking a web application
4 months ago
Hacking Appliances: Ironic exploits in security products
4 months ago
GSM/GPRS Traffic Interception for Penetration Testing Engagements
4 months ago
Grepify – a Small Tool for Code Reviewers
4 months ago
Going “AUTH the Rails” on a Crazy Train
4 months ago
grepify
4 months ago
Ghost Vulnerability (CVE-2015-0235)
4 months ago
Gizmo
4 months ago
Ghidra nanoMIPS ISA module
4 months ago
Getting Shell with XAMLX Files
4 months ago
General Data Protection Regulation: Knowing your data
4 months ago
Getting per-user Conditional Access MFA status in Azure
4 months ago
G-Scout
4 months ago
Game Security
4 months ago
General Data Protection Regulation – are you ready?
4 months ago
Fuzzing USB devices using Frisbee Lite
4 months ago
Fuzzing RTSP to discover an exploitable vulnerability in VLC
4 months ago
Fuzzing the Easy Way Using Zulu
4 months ago
Checked
6 hours 23 minutes ago