NCC Group Research Blog
CVE-2018-8611 Exploiting Windows KTM Part 2/5 – Patch analysis and basic triggering
7 months 2 weeks ago
Curve9767 and Fast Signature Verification
7 months 2 weeks ago
CVE-2017-8570 RTF and the Sisfader RAT
7 months 2 weeks ago
CVE-2018-8611 – Diving into the Windows Kernel Transaction Manager (KTM) for fun and exploitation
7 months 2 weeks ago
Cryptopals: Exploiting CBC Padding Oracles
7 months 2 weeks ago
Cups-filters remote code execution
7 months 2 weeks ago
Critical Risk Vulnerability in SAP Message Server (Heap Overflow)
7 months 2 weeks ago
Cross Site Request Forgery: An Introduction to a Common Web Application Weakness
7 months 2 weeks ago
Cross-Execute Your Linux Binaries, Don’t Cross-Compile Them
7 months 2 weeks ago
Critical Risk Vulnerability in Ingres (Pointer Overwrite 2)
7 months 2 weeks ago
Critical Risk Vulnerability in SAP DB Web Server (Stack Overflow)
7 months 2 weeks ago
Creating Arbitrary Shellcode In Unicode Expanded Strings
7 months 2 weeks ago
creep-web-app-scanner
7 months 2 weeks ago
Critical Risk Vulnerability in Ingres (Pointer Overwrite 1)
7 months 2 weeks ago
Crave the Data: Statistics from 1,300 Phishing Campaigns
7 months 2 weeks ago
Creating a Safer OAuth User Experience
7 months 2 weeks ago
Cracking RDP NLA Supplied Credentials for Threat Intelligence
7 months 2 weeks ago
Cranim: A Toolkit for Cryptographic Visualization
7 months 2 weeks ago
CowCloud
7 months 2 weeks ago
Checked
5 hours 36 minutes ago