Rosecurify

Seclog - #121

"A swift attack in the cyber world is unseen; its effects, devastating." - The Art of Cyber War

πŸ“š SecMisc #

Cybench – A JVM performance benchmarking and profiling platform. Read More

DNM Buyer’s Bible – A practical guide for darknet markets and privacy preservation. Read More


Threat Modeling GitHub – A breakdown of GitHub's intentionally vulnerable design through threat modeling. Read More

Next Token Prediction & LLMs – How predicting the next token can be weaponized in LLMs. Read More

0-Click RCE on SuperNote E-Ink – Remote rootkit-style vulnerability in SuperNote tablets. Read More

MCP Tool Poisoning – Exploiting and hijacking MCP clients through tool poisoning. Read More

Agent2Agent Protocol (A2A) – Google’s new protocol enabling agent-to-agent interoperability. Read More

Prompt Engineering – A technical whitepaper on crafting prompts to guide AI output. Read More

AI Vulnerability Discovery – Can AI discover and exploit vulnerabilities? A Schneier analysis. Read More

Langflow Python RCE – Unauthenticated RCE in Langflow via exec() abuse. Read More

pgAdmin RCE (CVE-2025-2945) – Exploit write-up for a critical pgAdmin remote code execution flaw. Read More

.NET Deobfuscation – Reverse-engineering obfuscated .NET binaries. Read More

Anti-EDR Compendium – A deep technical dive into how EDRs workβ€”and how attackers bypass them. Read More


🐦 SecX #

AI MVP Security Checklist – A must-read checklist before launching any AI-based MVP. View on X

CVE-2025-30406 PoC – A working proof-of-concept for a newly added CVE on CISA's KEV list. View on X


πŸŽ₯ SecVideo #

From Zero to Zero Day – The hacker journey of Jonathan Jacobi and real-world 0day stories. Watch Here

Is Cursor or Windsurf Safe? – Evaluating the security of two popular AI tools. Watch Here

Hacking Happy Hour Ep.118 – A casual talk on 0days, SQLi, and red team news. Watch Here


πŸ’» SecGit #

mcp-scan – A scanning tool designed for identifying security issues in MCP servers. Explore on GitHub

looking-glass – A tool for indexing, querying, and repeating searches through codebases. Explore on GitHub

CVE-2025-30065 PoC – A working proof-of-concept for the named CVE. Explore on GitHub

blutter – A reverse engineering toolkit for Flutter mobile applications. Explore on GitHub

CVE-2025-22457 PoC – A public exploit for CVE-2025-22457. Explore on GitHub

RF-Clown – BLE and Bluetooth jammer using ESP32 and nRF24L01 hardware. Explore on GitHub

passphrase-wordlist – A comprehensive wordlist and hashcat rule set for cracking long passphrases. Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog