NCC Group Research Blog
Ghidra nanoMIPS ISA module
5 months 3 weeks ago
Getting Shell with XAMLX Files
5 months 3 weeks ago
General Data Protection Regulation: Knowing your data
5 months 3 weeks ago
Getting per-user Conditional Access MFA status in Azure
5 months 3 weeks ago
G-Scout
5 months 3 weeks ago
Game Security
5 months 3 weeks ago
General Data Protection Regulation – are you ready?
5 months 3 weeks ago
Fuzzing USB devices using Frisbee Lite
5 months 3 weeks ago
Fuzzing RTSP to discover an exploitable vulnerability in VLC
5 months 3 weeks ago
Fuzzing the Easy Way Using Zulu
5 months 3 weeks ago
Fuzzing the Easy Way Using Zulu (1)
5 months 3 weeks ago
From ERMAC to Hook: Investigating the technical differences between two Android malware variants
5 months 3 weeks ago
Fuzzbox
5 months 3 weeks ago
FrisbeeLite
5 months 3 weeks ago
From CSV to CMD to qwerty
5 months 3 weeks ago
FPGAs: Security Through Obscurity?
5 months 3 weeks ago
Freddy: An extension for automatically identifying deserialisation issues in Java and .NET applications
5 months 3 weeks ago
Flubot: the evolution of a notorious Android Banking Malware
5 months 3 weeks ago
Forensic Fuzzing Tools
5 months 3 weeks ago
Checked
6 hours 18 minutes ago