Seclog - #115
"When all defenses fail, the art of survival is in your ability to disappear without a trace." - The Art of Cyber War
📚 SecMisc
📰 SecLinks
Prompt Injection Attacks for Dummies - A comprehensive guide to understanding and preventing prompt injection attacks. Read More
Credmaster2 - WhyNotSecurity - Exploring Gmail user enumeration techniques. Read More
An 18 years old bug - An analysis of a long-standing vulnerability. Read More
Using Mind Maps in Application Security Testing - Enhancing security testing with mind maps. Read More
How to gain code execution on millions of people and hundreds of popular apps - Uncovering mass exploitation techniques. Read More
Ranking MFA Methods - From Least to Most Secure - A comparative analysis of MFA methods. Read More
Substack Domain Takeover - Investigating a domain takeover vulnerability. Read More
SOTI Security Defenders’ Guide 2025 - Insights into 2025 cybersecurity trends. Read More
How to Hack AI Agents and Applications - Tactics for exploiting AI systems. Read More
Evil Crow RF: A Portable Radio Frequency Device - Exploring RF hacking tools. Read More
An iCloud Backdoor Would Make Our Phones Less Safe - Analysis of potential iCloud vulnerabilities. Read More
Bybit Hack Report - An in-depth look at the Bybit hack. Read More
Safe{Wallet} Statement on Targeted Attack on Bybit - Official response to the Bybit attack. Read More
GitLab Account Takeover via Password Reset - A HackerOne report on a critical vulnerability. Read More
OWASP LLM Exploit Generation v1.0 - A guide to LLM & AI security risks. Read More
Pwn everything Bounce everywhere all at once (part 2) - Advanced exploitation techniques. Read More
🐦 SecX #
Grok Web App Security - Enhancements in Content Security Policy to prevent data leakage. Read More
Lazarus Draining 1.5 Billion - Analysis of the malicious JS attack on Safe{Wallet}. Read More
💻 SecGit
CVE-2025-25279 - Details on a critical vulnerability. Explore on GitHub
Wayback Machine OSINT Framework - Chronos for historical OSINT. Explore on GitHub
Camtruder - Advanced RTSP camera discovery tool. Explore on GitHub
1-Line RAT - Reverse remote shell access via browser. Read More
FuzzyAI - Automated LLM fuzzing tool. Explore on GitHub
TruffleHog Explorer - Web-based tool for TruffleHog data analysis. Explore on GitHub
Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.
For any suggestions or feedback, please contact us at: [email protected]Subscribe to Seclog
Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.
No spam. Only high-security insights. Unsubscribe at any time.