Rosecurify

Seclog - #89

Is Telegram really an encrypted messaging app? - Exploring the security claims and encryption practices of Telegram messaging app. Read More

Reading PCAP Files (Directly) With DuckDB - Tutorial on analyzing network capture files using DuckDB for efficient data processing. Read More

Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access - Presentation on identifying and exploiting vulnerabilities in cloud infrastructure for unauthorized access. Read More

Mobile Reverse Engineering 101 - Comprehensive guide to understanding and practicing mobile application reverse engineering techniques. Read More

Audit of Airswift's Supply Chain Financing - Detailed security analysis of Airswift's financial system, focusing on potential vulnerabilities. Read More

Bypassing airport security via SQL injection - Exploration of SQL injection vulnerabilities in airport security systems and their potential impact. Read More

Flipping Pages: An analysis of a new Linux vulnerability in nf_tables - In-depth analysis of a newly discovered Linux security flaw and associated exploitation techniques. Read More

DNSFS: Store your files in others DNS resolver caches - Innovative approach to distributed file storage leveraging DNS resolver caches. Read More

Analysis of CVE-2024-43044 - Comprehensive breakdown of a critical security vulnerability, its implications, and mitigation strategies. Read More

How Hackers love you HTTP data - Insights into how hackers exploit HTTP data for malicious purposes. Read More

๐Ÿ’ป SecGit #

storax/kubedoom: Kill Kubernetes pods by playing Id's DOOM! - A unique way to manage Kubernetes pods through a game interface. Explore on GitHub

coder/wush: simplest & fastest way to transfer files between computers via wireguard - Efficient file transfer tool using Wireguard. Explore on GitHub

sinsinology/CVE-2024-6670 - Repository related to a specific CVE, likely containing exploit or analysis information. Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog