NCC Group Research Blog
CVE-2021-31956 Exploiting the Windows Kernel (NTFS with WNF) – Part 1
1 year 1 month ago
CVE-2018-8611 Exploiting Windows KTM Part 3/5 – Triggering the race condition and debugging tricks
1 year 1 month ago
CVE-2018-8611 Exploiting Windows KTM Part 4/5 – From race win to kernel read and write primitive
1 year 1 month ago
CVE-2018-8611 Exploiting Windows KTM Part 5/5 – Vulnerability detection and a better read/write primitive
1 year 1 month ago
CVE-2018-8611 Exploiting Windows KTM Part 1/5 – Introduction
1 year 1 month ago
CVE-2018-8611 Exploiting Windows KTM Part 2/5 – Patch analysis and basic triggering
1 year 1 month ago
Curve9767 and Fast Signature Verification
1 year 1 month ago
CVE-2017-8570 RTF and the Sisfader RAT
1 year 1 month ago
CVE-2018-8611 – Diving into the Windows Kernel Transaction Manager (KTM) for fun and exploitation
1 year 1 month ago
Cryptopals: Exploiting CBC Padding Oracles
1 year 1 month ago
Cups-filters remote code execution
1 year 1 month ago
Critical Risk Vulnerability in SAP Message Server (Heap Overflow)
1 year 1 month ago
Cross Site Request Forgery: An Introduction to a Common Web Application Weakness
1 year 1 month ago
Cross-Execute Your Linux Binaries, Don’t Cross-Compile Them
1 year 1 month ago
Critical Risk Vulnerability in Ingres (Pointer Overwrite 2)
1 year 1 month ago
Critical Risk Vulnerability in SAP DB Web Server (Stack Overflow)
1 year 1 month ago
Creating Arbitrary Shellcode In Unicode Expanded Strings
1 year 1 month ago
creep-web-app-scanner
1 year 1 month ago
Critical Risk Vulnerability in Ingres (Pointer Overwrite 1)
1 year 1 month ago
Checked
5 hours 32 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed