Seclog - #107
๐ SecMisc
Orbit by Mozilla - A powerful tool for creating custom secure browsing environments. Read More
Frida HandBook - Comprehensive guide to using Frida for application security analysis. Read More
๐ฐ SecLinks
Simple Prompts to get the System Prompts - eval.blog - Learn how to use simple prompts to understand system-level configurations. Read More
Building AI Agents to Solve Security Challenges | DevSec Blog - Explore how AI agents can tackle security challenges effectively. Read More
Scaling Threat Modeling with AI: Generating 1000 Threat Models Using Gemini 2.0 and AI Security Analyzer - xvnpw personal blog - Dive into large-scale threat modeling powered by AI. Read More
From Pegasus to Predator - The evolution of Commercial Spyware on iOS - media.ccc.de - A deep dive into the development of iOS spyware. Read More
How We are Self Hosting Code Scanning at Reddit : r/RedditEng - Insights into Reddit's approach to self-hosted code scanning. Read More
When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying - Investigating vulnerabilities in hosted AI models. Read More
Bypassing Google's Magika & Bullying AI - Techniques for bypassing Google's Magika restrictions. Read More
2024 CVE Data Review โ JerryGamblin.com - A comprehensive review of CVEs from 2024. Read More
Remote Code Execution (RCE) Exploits - How Hackers Exploit from Home - Ocsaly Academy - Learn how attackers exploit RCE vulnerabilities and how to defend against them. Read More
A Signature Verification Bypass in Nuclei (CVE-2024-43405) | Wiz Blog - Explore the technical details behind CVE-2024-43405. Read More
๐ป SecGit
mmaitre314/picklescan - A Python security scanner detecting malicious pickle files. Explore on GitHub
NHAS/reverse_ssh - A reverse shell based on SSH. Explore on GitHub
alufers/mitmproxy2swagger - Reverse-engineer REST APIs by capturing traffic. Explore on GitHub
GangGreenTemperTatum/DOMspy - A web security research tool for testing DOM-based vulnerabilities. Explore on GitHub
Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.
For any suggestions or feedback, please contact us at: [email protected]Subscribe to Seclog
Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.
No spam. Only high-security insights. Unsubscribe at any time.