Seclog - #54
I have been impressed with the urgency of doing. Knowing is not enough; we must apply. Being willing is not enough; we must do. โ Leonardo da Vinci
๐ก๏ธ SecMisc
-
ContainerCVE: A tool to scan Docker containers for security vulnerabilities. Explore ContainerCVE
-
ugrep: An advanced file pattern searcher. Discover ugrep
-
Awesome uBlacklist: A curated list of uBlacklist subscriptions to block unwanted search results. View on GitHub
๐ SecLinks
-
AI Language Model Parameters Explained: Omar Santos discusses top_p, Temperature, num_beams, and do_sample. Read on Medium
-
Operation Triangulation: Unraveling the last hardware mystery. Securelist Article
-
AI Prompt Injection: Insights into the emerging threats. Learn More
-
Poor Mans Sim Porting: Exploring USSD functionality in SIM card hijacking. Read Blog
-
GPTs Attack Vector - PITM: Demonstrating a new attack strategy. Explore PITM
-
Exploiting SQL Injection in PostgreSQL: Innovative error-based payloads. Mannulinux Article
-
Monitoring JavaScript files for Bug Hunting: Tips and tricks for effective monitoring. Read Post
-
Teleport - Access List Role Escalation: Security report detailing an escalation vulnerability. HackerOne Report
-
Colliding Secure Hashes: Exploring the intricacies of hash collisions. David Buchanan's Blog
-
SSH over HTTPS: A guide to setting up SSH access via HTTPS. Trofi's Blog
-
Browser Extension Pentesting Methodology: A comprehensive guide to pentesting browser extensions. HackTricks Book
-
Bypass SSL Pinning for Flutter: Understanding Flutter and SSL pinning bypass techniques. Medium Article
๐ฆ SecTweet
Sam Curry's anecdote about finding a Harry Potter quote in Apple's iCloud debug page. View Tweet
๐ SecGit
-
Hackmanit/TInjA: Explore this GitHub repository. View on GitHub
-
crytic/tealer: A tool for tealing. Check it out
-
dwisiswant0/ngocok: Discover what this repository offers. GitHub Link
-
chbrown/unmap: A unique GitHub project. Visit Repository
-
bierschi/chromepass: A tool related to Chrome's password handling. View on GitHub
Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.
For any suggestions or feedback, please contact us at: [email protected]Subscribe to Seclog
Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.
No spam. Only high-security insights. Unsubscribe at any time.