Rosecurify

Seclog - #90

"Never let your enemy know your next move, especially if it's turning the router off and on again." - The Art of Cyber War

๐Ÿ“š SecMisc #

Living Off the Living Off the Land | LOLOL - A resource for living off the land techniques - Read More

shell.how - How this shell command works? - A tool to explain shell commands - Read More

URL validation bypass cheat sheet - 2024 Edition | Web Security Academy - Techniques for bypassing URL validation in SSRF attacks - Read More

Chasing Shadows: Geolocate Images with Bellingcat's Shadow Finder Tool - Using shadows for image geolocation - Read More

CVE Hunting Made Easy - Techniques for efficient CVE discovery - Read More

Intercepting Mobile Application Traffic with Caido and Frida - Mobile app traffic interception techniques - Read More

Preventing the Risk of Request Collapsing in Web Caching - Web caching security risks and prevention - Read More

What's the worst place to leave your secrets? - Research on exposed AWS credentials - Read More

Everything you need to know about the OSCP+ - Comprehensive guide to the OSCP+ certification - Read More

Security Advisory YSA-2024-03 | Yubico - Yubico security advisory details - Read More

Back to School - Exploiting a Remote Code Execution Vulnerability in Moodle - Moodle RCE vulnerability analysis - Read More

Some thoughts on the YubiKey EUCLEAK Vulnerability - Analysis of the YubiKey EUCLEAK vulnerability - Read More

๐Ÿ’ป SecGit #

keywa7/keywa7 - A tool for bypassing firewall Application Based Rules - Explore on GitHub

jasonxtn/Kraken - All-in-One Toolkit for BruteForce Attacks - Explore on GitHub

sdushantha/tmpmail - A temporary email right from your terminal written in POSIX sh - Explore on GitHub

OWASP/IoTGoat - Deliberately insecure firmware for IoT security education - Explore on GitHub

hubert3/iSniff-GPS - Passive sniffing tool for capturing WiFi location data from iOS devices - Explore on GitHub

fredrik-hansen/logpt - Python code for analyzing logfiles using LLM - Explore on GitHub

aquasecurity/traceeshark - Deep Linux runtime visibility tool - Explore on GitHub

RedTeamOperations/Red-Infra-Craft - Automated deployment of red team infrastructures - Explore on GitHub

erfur/jadx-eval-method - PoC plugin for jadx-gui to evaluate methods and update decompiler output - Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog