NCC Group Research Blog
Public Report – Confidential Mode for Hyperdisk – DEK Protection Analysis
7 months 3 weeks ago
Public Report – Confidential Space Security Review
7 months 3 weeks ago
Public Report – BLST Cryptographic Implementation Review
7 months 3 weeks ago
Public Report – Caliptra Security Assessment
7 months 3 weeks ago
Public Report – Filecoin Bellman and BLS Signatures Cryptographic Review
7 months 3 weeks ago
Public Report – Android Cloud Backup/Restore
7 months 3 weeks ago
Public Report – Coda Cryptographic Review
7 months 3 weeks ago
Public cloud
7 months 3 weeks ago
Proxy Re-Encryption Protocol: IronCore Public Report
7 months 3 weeks ago
PRTG Network Monitor Command injection
7 months 3 weeks ago
Protecting stored cardholder data (an unofficial supplement to PCI DSS V3.0)
7 months 3 weeks ago
ProxMon
7 months 3 weeks ago
ProxMon: Automating Web Application Penetration Testing
7 months 3 weeks ago
Project Triforce: Run AFL on Everything!
7 months 3 weeks ago
Properly Signed Certificates on CPE Devices
7 months 3 weeks ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 8: Development of Prototype #4 – Building on Takaesu’s Approach with Focus on XSS
7 months 3 weeks ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 9: Adventures with Expert Systems
7 months 3 weeks ago
Project Bishop: Clustering Web Pages
7 months 3 weeks ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 6: Development of Prototype #2 – Creating a SQLi PoC
7 months 3 weeks ago
Checked
11 hours 3 minutes ago