NCC Group Research Blog
Exploiting the Sudo Baron Samedit vulnerability (CVE-2021-3156) on VMWare vCenter Server 7.0
4 months 2 weeks ago
Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE-2015-0057) bug on both 32-bit and 64-bit
4 months 2 weeks ago
Exploiting Rich Content
4 months 2 weeks ago
Exploiting Samba CVE-2015-0240 on Ubuntu 12.04 and Debian 7 32-bit
4 months 2 weeks ago
Exploiting Noisy Oracles with Bayesian Inference
4 months 2 weeks ago
Exploiting PL/SQL Injection Flaws with only CREATE SESSION Privileges
4 months 2 weeks ago
Exploiting CVE-2015-2426, and How I Ported it to a Recent Windows 8.1 64-bit
4 months 2 weeks ago
Exploiting MS15-061 Use-After-Free Windows Kernel Vulnerability
4 months 2 weeks ago
Exploiting CVE-2014-0282
4 months 2 weeks ago
Exploiting CVE-2014-0282 (1)
4 months 2 weeks ago
Experiments in Extending Thinkst Canary – Part 1
4 months 2 weeks ago
Exploit mitigations: keeping up with evolving and complex software/hardware
4 months 2 weeks ago
Exploit the Fuzz – Exploiting Vulnerabilities in 5G Core Networks
4 months 2 weeks ago
Eurocrypt 2023: Death of a KEM
4 months 2 weeks ago
Exception Handling and Data Integrity in Salesforce
4 months 2 weeks ago
EternalGlue part one: Rebuilding NotPetya to assess real-world resilience
4 months 2 weeks ago
Ethics in Security Testing
4 months 2 weeks ago
Enumerating System Management Interrupts
4 months 2 weeks ago
Erlang Security 101
4 months 2 weeks ago
Checked
2 hours 21 minutes ago