NCC Group Research Blog
POC2021 – Pwning the Windows 10 Kernel with NTFS and WNF Slides
6 months 3 weeks ago
Phishing Mitigations: Configuring Microsoft Exchange to Clearly Identify External Emails
6 months 3 weeks ago
Phishing Stories
6 months 3 weeks ago
Peeling back the layers on defence in depth…knowing your onions
6 months 3 weeks ago
Perfect Forward Security
6 months 3 weeks ago
PhanTap (Phantom Tap): Making networks spookier one packet at a time
6 months 3 weeks ago
PDF Form Filling and Flattening Tool Buffer Overflow
6 months 3 weeks ago
PeachFarmer
6 months 3 weeks ago
Payment Card Industry Data Security Standard (PCI DSS) A Navigation and Explanation of Changes from v2.0 to v3.0
6 months 3 weeks ago
Past, Present and Future of Effective C
6 months 3 weeks ago
Password and brute-force mitigation policies
6 months 3 weeks ago
Passive Information Gathering – The Analysis of Leaked Network Security Information
6 months 3 weeks ago
Paradoxical Compression with Verifiable Delay Functions
6 months 3 weeks ago
Passive Decryption of Ethereum Peer-to-Peer Traffic
6 months 3 weeks ago
Pairing over BLS12-381, Part 3: Pairing!
6 months 3 weeks ago
Paper: Thematic for Success in Real-World Offensive Cyber Operations – How to make threat actors work harder and fail more often
6 months 3 weeks ago
Pairing over BLS12-381, Part 1: Fields
6 months 3 weeks ago
Pairing over BLS12-381, Part 2: Curves
6 months 3 weeks ago
Package Play
6 months 3 weeks ago
Checked
3 hours 6 minutes ago