Rosecurify

Seclog - #45

Your talent is God's gift to you. What you do with it is your gift back to God. — Leo Buscaglia


What Happens After You Shift Security Left?

Root takeover via signature spoofing vulnerability found in kernelsu

CVE-2023-4427 enum cache indices array out of bound access

Hackers Stole Access Tokens from Okta’s Support Unit

Tracking Unauthorized Access to Okta's Support System | Okta Security

You Are Not Where You Think You Are, Opera Browsers Address Bar Spoofing Vulnerabilities

Customizing Sliver - Part 1

Kubernetes | Report #2039464 - Code inject via nginx.ingress.kubernetes.io/permanent-redirect annotation

Cloudflare sees surge in hyper-volumetric HTTP DDoS attacks

secmisc #

Arkime

Home - KubeHound

iLeakage

Invisible Internet Protocol Daemon

Internet Artifacts

secvideo #

Securing AND Pentesting the Great Spaghetti Monster (k8s) by Kat FItzgerald

Purple Teaming (Black Hat USA 2023 Booth Talk)

Automating Boolean SQL Injection and Evading Filters

secgit #

nopcorn/CuteRAT

dekadentno/beagle.js

Hakky54/certificate-ripper

kevin-mizu/domloggerpp

xnl-h4ck3r/LookMark


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog