NCC Group Research Blog
Secure Coding Rules for Java LiveLessons, Part 1
11 months 1 week ago
Secure Application Development on Facebook
11 months 1 week ago
Secure Coding in C and C++
11 months 1 week ago
Secure Coding in C and C++, 2nd Edition
11 months 1 week ago
SCOMplicated? – Decrypting SCOM “RunAs” credentials
11 months 1 week ago
Second-Order Code Injection Attacks
11 months 1 week ago
Scenester – A Small Tool for Cross-Platform Web Application
11 months 1 week ago
scenester
11 months 1 week ago
SAML Pummel
11 months 1 week ago
SAML XML Injection
11 months 1 week ago
Samba Andx Request Remote Code Execution
11 months 1 week ago
Samba on the BlackBerry PlayBook
11 months 1 week ago
Salesforce Security with Remote Working
11 months 1 week ago
Samba _netr_ServerPasswordSet Expoitability Analysis
11 months 1 week ago
Rustproofing Linux (Part 4/4 Shared Memory)
11 months 1 week ago
Ruxcon 2013 – Introspy Presentation Slides
11 months 1 week ago
Sakula: an adventure in DLL planting
11 months 1 week ago
Rustproofing Linux (Part 2/4 Race Conditions)
11 months 1 week ago
Rustproofing Linux (Part 3/4 Integer Overflows)
11 months 1 week ago
Checked
20 minutes 37 seconds ago