NCC Group Research Blog
Public Report – Confidential Space Security Review
4 months ago
Public Report – BLST Cryptographic Implementation Review
4 months ago
Public Report – Caliptra Security Assessment
4 months ago
Public Report – Filecoin Bellman and BLS Signatures Cryptographic Review
4 months ago
Public Report – Android Cloud Backup/Restore
4 months ago
Public Report – Coda Cryptographic Review
4 months ago
Public cloud
4 months ago
Proxy Re-Encryption Protocol: IronCore Public Report
4 months ago
PRTG Network Monitor Command injection
4 months ago
Protecting stored cardholder data (an unofficial supplement to PCI DSS V3.0)
4 months ago
ProxMon
4 months ago
ProxMon: Automating Web Application Penetration Testing
4 months ago
Project Triforce: Run AFL on Everything!
4 months ago
Properly Signed Certificates on CPE Devices
4 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 8: Development of Prototype #4 – Building on Takaesu’s Approach with Focus on XSS
4 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 9: Adventures with Expert Systems
4 months ago
Project Bishop: Clustering Web Pages
4 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 6: Development of Prototype #2 – Creating a SQLi PoC
4 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 7: Development of Prototype #3 – Adventures in Anomaly Detection
4 months ago
Checked
8 hours 33 minutes ago