unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
A Guide to Improving Security Through Infrastructure-as-Code
Modern organizations evolved and took the next step when they became digital. Organizations...
2022-9-19 18:0:0 | 阅读: 25 |
收藏
|
research.nccgroup.com
cloud
security
github
microsoft
iac
Tool Release – ScoutSuite 5.12.0
We are excited to announce the release of a new version of our open-source...
2022-9-14 01:32:41 | 阅读: 34 |
收藏
|
research.nccgroup.com
cloud
gcp
monitoring
scout
scoutsuite
Public Report – Penumbra Labs Decaf377 Implementation and Poseidon Parameter Selection Review
During the summer of 2022, Penumbra Labs, Inc. engaged NCC Group to conduc...
2022-9-13 04:13:15 | 阅读: 16 |
收藏
|
research.nccgroup.com
fernick
jennifer
poseidon
decaf377
377
Tool Release – Monkey365
Monkey 365 is an Open Source security tool that can be used to easily...
2022-9-8 02:27:26 | 阅读: 41 |
收藏
|
research.nccgroup.com
monkey365
security
monkey
unblock
microsoft
Sharkbot is back in Google Play
Authored by Alberto Segura (main author) and Mike Stokkel (co-author)Editor’s note: This...
2022-9-7 02:32:7 | 阅读: 22 |
收藏
|
research.nccgroup.com
sharkbot
c2
victim
Constant-Time Data Processing At a Secret Offset, Privacy and QUIC
NCC Group Cryptography Services team assessed security aspects of several implementations of...
2022-9-5 21:0:0 | 阅读: 23 |
收藏
|
research.nccgroup.com
ct
reveal
declaim
timing
usize
There’s Another Hole In Your SoC: Unisoc ROM Vulnerabilities
UNISOC (formerly Spreadtrum) is a rapidly growing semiconductor company that is nowadays focused...
2022-9-3 02:37:37 | 阅读: 141 |
收藏
|
research.nccgroup.com
bootrom
payload
unisoc
pubkey
sig
Conference Talks – September/October 2022
Throughout September and October, members of NCC Group will be presenting...
2022-9-1 23:29:59 | 阅读: 20 |
收藏
|
research.nccgroup.com
mimikatz
security
jenkins
bucsay
SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250)
Introductionnetlink and nf_tablesOverviewSetsExpressionsSet ExpressionsStateful Expr...
2022-9-1 16:56:41 | 阅读: 28 |
收藏
|
research.nccgroup.com
nf
elem
netfilter
dynset
payload
Writing FreeBSD Kernel Modules in Rust
At present all major operating system kernels are written in C/C++,languages which provide no o...
2022-8-31 22:51:28 | 阅读: 27 |
收藏
|
research.nccgroup.com
cdev
memory
debugln
unload
NCC Con Europe 2022 – Pwn2Own Austin Presentations
Cedric Halbronn, Aaron Adams, Alex Plaskett and Catalin Visinescu presente...
2022-8-30 18:22:23 | 阅读: 27 |
收藏
|
research.nccgroup.com
pwn2own
contest
printer
exploited
internals
Tool Release – JWT-Reauth
When testing APIs with short-lived authentication tokens, it can be frustr...
2022-8-26 00:20:19 | 阅读: 42 |
收藏
|
research.nccgroup.com
reauth
burp
proxy
github
Back in Black: Unlocking a LockBit 3.0 Ransomware Attack
Authored by: Ross Inman (@rdi_x64)tl;drThis post explores some...
2022-8-19 22:30:21 | 阅读: 94 |
收藏
|
research.nccgroup.com
windows
cobalt
ransomware
lockbit
Wheel of Fortune Outcome Prediction – Taking the Luck out of Gambling
Authored by: Jesús Miguel Calderón MarínIntroductionTwo years ago I carried out research...
2022-8-17 03:50:20 | 阅读: 37 |
收藏
|
research.nccgroup.com
wheel
betting
winning
segments
positions
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study
Max Groot & Ruud van LuijkTL;DRA recently uncovered malware sample dubbed ‘Saitama’ was...
2022-8-11 23:20:24 | 阅读: 29 |
收藏
|
research.nccgroup.com
saitama
c2
client
tunnelling
fox
Implementing the Castryck-Decru SIDH Key Recovery Attack in SageMath
IntroductionLast weekend (July 30th) a truly incredible piece of mathematical/cryptanalysis...
2022-8-9 05:44:48 | 阅读: 36 |
收藏
|
research.nccgroup.com
sagemath
sidh
isogeny
magma
isogenies
Top of the Pops: Three common ransomware entry techniques
by Michael Mathews Ransomware has been a concern for everyone over the past several years be...
2022-8-4 15:30:11 | 阅读: 26 |
收藏
|
research.nccgroup.com
network
ransomware
security
remote
affiliates
NCC Group Research at Black Hat USA 2022 and DEF CON 30
This year, NCC Group researchers will be presenting at least five presentations at Black Hat USA...
2022-8-4 04:15:44 | 阅读: 39 |
收藏
|
research.nccgroup.com
security
bias
usa
microsoft
pipelines
Technical Advisory – Multiple vulnerabilities in Nuki smart locks (CVE-2022-32509, CVE-2022-32504, CVE-2022-32502, CVE-2022-32507, CVE-2022-32503, CVE-2022-32510, CVE-2022-32506, CVE-2022-32508, CVE-2022-32505)
The following vulnerabilities were found as part of a research project looking at the state of s...
2022-7-25 16:30:0 | 阅读: 96 |
收藏
|
research.nccgroup.com
nuki
writeread
keyturner
lr
keypad
NIST Selects Post-Quantum Algorithms for Standardization
Last week, NIST announced some algorithms selected for standardization as part of their Post-Qua...
2022-7-14 04:4:34 | 阅读: 26 |
收藏
|
research.nccgroup.com
falcon
lattice
dilithium
crystals
sphincs
Previous
9
10
11
12
13
14
15
16
Next