NCC Group Research Blog
Premium Content Gateway
4 months 2 weeks ago
Potential false redirection of web site content in Internet in SAP NetWeaver web applications
4 months 2 weeks ago
Practical Considerations of Right-to-Repair Legislation
4 months 2 weeks ago
Porting the Misfortune Cookie Exploit: A Look into Router Exploitation Using the TD-8817
4 months 2 weeks ago
Post-exploiting a compromised etcd – Full control over the cluster and its nodes
4 months 2 weeks ago
Post-quantum cryptography overview
4 months 2 weeks ago
Popping Blisters for research: An overview of past payloads and exploring recent developments
4 months 2 weeks ago
port-scan-automation
4 months 2 weeks ago
Pointer Sequence Reverser (PSR)
4 months 2 weeks ago
Poison Ivy string decryption
4 months 2 weeks ago
Pip3line
4 months 2 weeks ago
Pip3line – The Swiss Army Knife of Byte Manipulation
4 months 2 weeks ago
POC2021 – Pwning the Windows 10 Kernel with NTFS and WNF Slides
4 months 2 weeks ago
Phishing Mitigations: Configuring Microsoft Exchange to Clearly Identify External Emails
4 months 2 weeks ago
Phishing Stories
4 months 2 weeks ago
Peeling back the layers on defence in depth…knowing your onions
4 months 2 weeks ago
Perfect Forward Security
4 months 2 weeks ago
PhanTap (Phantom Tap): Making networks spookier one packet at a time
4 months 2 weeks ago
PDF Form Filling and Flattening Tool Buffer Overflow
4 months 2 weeks ago
Checked
2 hours 41 minutes ago