NCC Group Research Blog
Flash local-with-filesystem Bypass in navigateToURL
5 months 3 weeks ago
Flash security restrictions bypass: File upload by URLRequest
5 months 3 weeks ago
firstexecution
5 months 3 weeks ago
Five Essential Machine Learning Security Papers
5 months 3 weeks ago
Finding the weak link in binaries
5 months 3 weeks ago
Firmware Rootkits: The Threat to the Enterprise
5 months 3 weeks ago
File Fuzzers
5 months 3 weeks ago
Finding and Exploiting .NET Remoting over HTTP using Deserialisation
5 months 3 weeks ago
Fat-Finger
5 months 3 weeks ago
Faux Disk Encryption: Realities of Secure Storage On Mobile Devices
5 months 3 weeks ago
Extractor
5 months 3 weeks ago
Faster Modular Inversion and Legendre Symbol, and an X25519 Speed Record
5 months 3 weeks ago
Extending a Thinkst Canary to become an interactive honeypot
5 months 3 weeks ago
External Enumeration and Exploitation of Email and Web Security Solutions
5 months 3 weeks ago
Extracting the Payload from a CVE-2014-1761 RTF Document
5 months 3 weeks ago
Exporting non-exportable RSA keys
5 months 3 weeks ago
Exposing Vulnerabilities in Media Software
5 months 3 weeks ago
Exploring Prompt Injection Attacks
5 months 3 weeks ago
Exploring the Security & Privacy of Canada’s Digital Proof of Vaccination Programs
5 months 3 weeks ago
Checked
5 hours 51 minutes ago