Rosecurify

Seclog - #108


๐Ÿ“š SecMisc #

WorstFit: Unveiling Hidden Transformers in Windows ANSI! - Explore how hidden transformers in Windows ANSI are unveiled. Read More

Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282) - A detailed exploitation walkthrough for Ivanti Connect Secure RCE. Read More

Top 10 web hacking techniques of 2024: nominations open - Nominate the top web hacking techniques of the year. Read More

DoubleClickjacking: A New Era of UI Redressing - Understand the evolution of UI redressing with DoubleClickjacking. Read More

How We Cracked a 512-Bit DKIM Key for Less Than $8 in the Cloud - Discover how a 512-bit DKIM key was cracked using cloud resources. Read More

2025 Cloud Security Predictions for CISOs & Engineers - Predictions for cloud security in 2025. Read More

Proton Services Status - Technical difficulties - Updates on Proton's technical issues. Read More

Gaining Access to Anyone's Browser Without Them Even Visiting a Website - A deep dive into a unique exploitation technique. Read More

Capturing the Flags of the Internet - Learn how to find zero-days in OSS and write scanners. Read More

Argo Workflows - Uncovering the Hidden Misconfigurations - Analysis of misconfigurations in Argo Workflows. Read More

๐ŸŽฅ SecVideo #

Fearsome File Formats - Insights into malicious file formats and their exploitation. Watch Here

Russian cyber-spies attack Ukraine - A report on cyber espionage activities targeting Ukraine. Watch Here

๐Ÿ’ป SecGit #

k3nundrum/hashcrack-ai - Bowing to the AI overlords with this hash cracking tool. Explore on GitHub

step-security/secure-repo - Orchestrating GitHub Actions Security. Explore on GitHub

ngalongc/salesforce-vulnerability-scanner - A scanner targeting Salesforce Lightning for academic purposes. Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog