NCC Group Research Blog
Announcing the Cryptopals Guided Tour Video 17: Padding Oracles!
4 months ago
Android-OpenDebug
4 months ago
Android-SSL-TrustKiller
4 months ago
Announcing NCC Group’s Cryptopals Guided Tour: Set 2
4 months ago
Android SSL Bypass
4 months ago
Android-KillPermAndSigChecks
4 months ago
Android Cloud Backup/Restore
4 months ago
Android Malware Vultur Expands Its Wingspan
4 months ago
Analysis of the Linux backdoor used in freenode IRC network compromise
4 months ago
Analyzing a PJL directory traversal vulnerability – exploiting the Lexmark MC3224i printer (part 2)
4 months ago
Analyzing AI Application Threat Models
4 months ago
Analysis of Boomerang Differential Trials via a SAT-Based Constraint Solver URSA
4 months ago
Analysis of setting cookies for third party websites in different browsers
4 months ago
An offensive guide to the Authorization Code grant
4 months ago
Analysing a recent Poison Ivy sample
4 months ago
An Introduction to Quantum Computing for Security Professionals
4 months ago
An Introduction to Ultrasound Security Research
4 months ago
An Introduction to Fault Injection (Part 1/3)
4 months ago
An Introduction to Heap overflows on AIX 5.3L
4 months ago
Checked
9 hours 36 minutes ago