unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Getting per-user Conditional Access MFA status in Azure
IntroductionLong time has passed since Microsoft implemented the first...
2023-6-28 04:26:35 | 阅读: 29 |
收藏
|
NCC Group Research - research.nccgroup.com
caoptics
caps
roadrecon
security
Exploiting Noisy Oracles with Bayesian Inference
In cryptographic attacks, we often rely on abstracted information sources w...
2023-6-24 04:5:18 | 阅读: 22 |
收藏
|
NCC Group Research - research.nccgroup.com
confidences
entropy
guided
probability
bayes
New Sources of Microsoft Office Metadata – Tool Release MetadataPlus
TL;DR – 31 usernames extracted vs 13 from the next leading brand!Introd...
2023-6-16 08:57:55 | 阅读: 22 |
收藏
|
NCC Group Research - research.nccgroup.com
username
hostnames
linq
foca
Dynamic Linq Injection Remote Code Execution Vulnerability (CVE-2023-32571)
Product DetailsVulnerability SummaryCVECVE-2023-32571CWECWE-184...
2023-6-13 21:27:46 | 阅读: 172 |
收藏
|
NCC Group Research - research.nccgroup.com
linq
orderby
library
predicate
Defeating Windows DEP With A Custom ROP Chain
OverviewThis article explains how to write a custom ROP (Return Oriente...
2023-6-12 17:0:0 | 阅读: 20 |
收藏
|
NCC Group Research - research.nccgroup.com
junk
shellcode
placeholder
0x42424242
Machine Learning 104: Breaking AES With Power Side-Channels
This executable blog post is the fourth in a series related to machine...
2023-6-9 17:0:0 | 阅读: 22 |
收藏
|
NCC Group Research - research.nccgroup.com
hardware
machine
blockchain
software
attend
A Brief Review of Bitcoin Locking Scripts and Ordinals
This article is an attempt at cataloging all the types of bitcoin transacti...
2023-6-8 23:16:54 | 阅读: 72 |
收藏
|
NCC Group Research - research.nccgroup.com
locking
blockchain
funds
How to Spot and Prevent an Eclipse Attack
Studies of blockchain architectures often start with the consensus algorithm...
2023-6-3 03:41:47 | 阅读: 17 |
收藏
|
NCC Group Research - research.nccgroup.com
network
victim
attacker
eclipse
peers
Eurocrypt 2023: Death of a KEM
Last month I was lucky enough to attend Eurocrypt 2023, which took place in...
2023-6-2 03:56:8 | 阅读: 17 |
收藏
|
NCC Group Research - research.nccgroup.com
isogeny
sidh
lattice
curves
Reverse Engineering Coin Hunt World’s Binary Protocol
IntroductionWe are going to walk through the process we took to reverse...
2023-5-31 09:0:0 | 阅读: 26 |
收藏
|
NCC Group Research - research.nccgroup.com
headerbyte
sfsdatatype
fsm
sfsobject
Technical Advisory – Multiple Vulnerabilities in Faronics Insight (CVE-2023-28344, CVE-2023-28345, CVE-2023-28346, CVE-2023-28347, CVE-2023-28348, CVE-2023-28349, CVE-2023-28350, CVE-2023-28351, CVE-2023-28352, CVE-2023-28353)
Faronics Insight is a feature rich software platform which is deployed...
2023-5-30 09:0:0 | 阅读: 112 |
收藏
|
NCC Group Research - research.nccgroup.com
teacher
faronics
consoles
insight
attacker
Tool Release: Code Query (cq)
Code Query is a new, open source universal code security scanning tool....
2023-5-26 23:14:16 | 阅读: 28 |
收藏
|
NCC Group Research - research.nccgroup.com
security
cq
slides
CowCloud
A common challenge technical teams (e.g. penetration testers) face is centr...
2023-5-26 01:28:41 | 阅读: 21 |
收藏
|
NCC Group Research - research.nccgroup.com
cowcloud
ec2
ami
nessus
repository
OffensiveCon 2023 – Exploit Engineering – Attacking the Linux Kernel
Cedric Halbronn and Alex Plaskett presented at OffensiveCon on the 19th of...
2023-5-23 20:17:6 | 阅读: 24 |
收藏
|
NCC Group Research - research.nccgroup.com
paillier
libslub
rigorous
analysis
Tool Release: Code Credential Scanner (ccs)
Code Credential Scanner is a new open source tool designed to detect hardco...
2023-5-23 19:0:0 | 阅读: 15 |
收藏
|
NCC Group Research - research.nccgroup.com
leaky
2y
cloud
php
github
Exploring Overfitting Risks in Large Language Models
In the following blog post, we explore how overfitting can affect Large Lan...
2023-5-23 05:16:16 | 阅读: 25 |
收藏
|
NCC Group Research - research.nccgroup.com
copyrighted
2560
overfitting
scores
The Paillier Cryptosystem with Applications to Threshold ECDSA
You may have heard of RSA (b. 1977), but have you heard of its cousin, Pail...
2023-5-19 22:41:55 | 阅读: 20 |
收藏
|
NCC Group Research - research.nccgroup.com
paillier
encryption
modulo
ecdsa
ciphertext
Rigging the Vote: Uniqueness in Verifiable Random Functions
This blog post presents a whirlwind overview of Verifiable Random Funct...
2023-5-18 19:0:0 | 阅读: 24 |
收藏
|
NCC Group Research - research.nccgroup.com
gamma
vrf
calculate
voting
committee
Medical Devices: A Hardware Security Perspective
Medical device security is gaining more attention for several reasons. The c...
2023-5-18 01:48:47 | 阅读: 17 |
收藏
|
NCC Group Research - research.nccgroup.com
security
patient
software
threats
development
NETGEAR Routers: A Playground for Hackers?
SummaryAdvisoriesVulnerabilitiesTelnetPSV-2023-0008– Telnet Default...
2023-5-15 17:13:36 | 阅读: 41 |
收藏
|
NCC Group Research - research.nccgroup.com
payload
netgear
2048
overflow
soapaction
Previous
5
6
7
8
9
10
11
12
Next