Seclog - #65
We can change our lives. We can do, have, and be exactly what we wish. — Tony Robbins
📚 SecMisc
Timelock Encryption: Send a secret into the future - Encrypt messages to be opened only after a set period. Read More
findsecuritycontacts.com - top sites - Find security contacts for top websites. Read More
ZafiyetAI | Yapay Zeka Güvenlik Atlası | Anasayfa - AI security insights and research in Turkish. Read More
📰 SecLinks
Tool of First Resort: Israel-Hamas War in Cyber - Dynamics of cyber warfare between Israel and Hamas. Read More
Manipulating LLMs – How to confuse ChatGPT – Compass Security Blog - Techniques to challenge and confuse ChatGPT. Read More
I figured out how DMARC works, and it almost broke me | Simon Andrews - Deep dive into setting up SPF, DKIM, DMARC for email security. Read More
Product security: barking up the wrong tree - Critical perspective on current product security practices. Read More
Insecurity and Python pickles [LWN.net] - Security vulnerabilities in Python's pickle module. Read More
2024 OSSRA Report - Insights from the Open Source Security and Risk Analysis Report. Read More
Reverse engineering a car key fob signal (Part 1) · 0x44.cc - Process and techniques of reverse engineering car key fob signals. Read More
How to find the AWS Account ID of any S3 Bucket - Identifying the AWS Account ID for any S3 bucket. Read More
Hiding in plain sight: Introducing WebTunnel | The Tor Project - Evading censorship with WebTunnel by the Tor Project. Read More
Devin, the first AI software engineer - Discussing the development and capabilities of Devin, an AI software engineer. Read More
Remote code execution in a billion-dollar publicly traded company · tedmdelacruz - Analysis of a remote code execution vulnerability. Read More
Picus-The-Complete-Active-Directory-Security-Handbook.v1 - Guide to securing Active Directory environments. Read More
What a Cluster: Local Volumes Vulnerability in Kubernetes | Akamai - Command injection vulnerability in Kubernetes. Read More
HackerOne | Report #2040756 - Vulnerability in Pentest Opportunity status alteration. Read More
Salt Labs research finds security flaws within ChatGPT Ecosystem (Remediated) Security flaws in the ChatGPT ecosystem. Read More
How I Exposed Instagram's Private Posts by Blocking Users · Cyber Security & Software Development - Exploiting a vulnerability on Instagram. Read More
Building an AITM attack tool in Cloudflare Workers (174 LOC) – Zolder B.V. - Building an attack tool using Cloudflare Workers. Read More
Security.txt in the wild – Gonçalo Valério - Analysis of the adoption and implementation of security.txt. Read More
🐦 SecTweet
Joseph Cox on X - New from 404 Media: Issue with safe lock manufacturers having backdoor codes. View Tweet
🎥 SecVideo
Fuzz Everything, Everywhere, All at Once - media.ccc.de - Insights into the applications of fuzzing in security. Watch Here
eBPF: Unlocking the Kernel [OFFICIAL DOCUMENTARY] - YouTube - Exploring eBPF technology in the Linux kernel. Watch Here
💻 SecGit
WRFan/jailbreak10.3.3 - Downgrading, jailbreaking, and setting up iOS 10.3.3 on an iPhone 5s. Explore on GitHub
anasfik/flutter-spy - Analyze and extract data from reverse-engineered Flutter apps. Explore on GitHub
gchq/CyberChef - A web app for encryption, encoding, compression, and data analysis. Explore on GitHub
BishopFox/llm-testing-findings - Templates for testing large language models (LLMs). Explore on GitHub
h4x0r-dz/CVE-2024-21762 - An out-of-bounds write vulnerability in Fortinet FortiOS. Explore on GitHub
piaolin/DetectDee - A tool to find social media accounts by username, email, or phone. Explore on GitHub
c2links/NoWhere2Hide - A project related to online privacy and security. Explore on GitHub
I've now added all your links to the template. If you need any further adjustments, please let me know!
Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.
For any suggestions or feedback, please contact us at: [email protected]Subscribe to Seclog
Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.
No spam. Only high-security insights. Unsubscribe at any time.