Rosecurify

Seclog - #91

"Build your network as you would a fortress; with layers, deception, and traps for the unwary." - The Art of Cyber War

πŸ“š SecMisc #

bug.directory - Description not provided - Read More

x86re - Description not provided - Read More

GAZEploit - Description not provided - Read More

OR 1=1 -- is Dying - Exploring the decline of a common SQL injection technique - Read More

OpenAI o1-preview vs Claude 3.5 Sonnet comparison - A comparative analysis of AI models - Read More

We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI - An unexpected cybersecurity discovery - Read More

Scorecarding Security - A method for evaluating security measures - Read More

Microsoft Copilot: From Prompt Injection to Exfiltration of Personal Information - Exploring vulnerabilities in AI assistants - Read More

Cracking OneDrive's Personal Vault - Investigating security measures of cloud storage - Read More

htmx ~ Web Security Basics (with htmx) - Web security fundamentals for htmx users - Read More

Browser Stored Credentials – Purple Team - Exploring browser security from a Purple Team perspective - Read More

Security has too many tools - by Frank Wang - Discussing the overabundance of security tools - Read More

Exploiting JavaScript Interface for Unauthorized Access in a 'global' cryptocurrency exchange android app - A case study in mobile app security - Read More

SSH Keystroke Obfuscation Bypass - Techniques for bypassing SSH security measures - Read More

Defend against vampires with 10 gbps network encryption - High-speed network security solutions - Read More

🐦 SecX #

Ryan Naraine on X: "An Ivanti 0day story in two parts 😰" - Discussing a newly discovered vulnerability - Read More

πŸŽ₯ SecVideo #

Fuzzing from First Principles with Alisa Esage - An introduction to fuzzing techniques - Watch Here

[D24] Have U Been Invited (episode 2) - MacOS Logic Bugs - Mikko KenttΓ€lΓ€ - Exploring MacOS vulnerabilities - Watch Here

πŸ’» SecGit #

c-skills/passport - Description not provided - Explore on GitHub

dadevel/impacket-zsh-integration - ZSH integration for Impacket - Explore on GitHub

alexdhital/Infiltrax - Post-exploitation reconnaissance tool for penetration testers and red teams - Explore on GitHub

josh0xA/darkdump - Open Source Intelligence Interface for Deep Web Scraping - Explore on GitHub

grahamhelton/USP - Linux persistence tool using udev rules - Explore on GitHub

Aegrah/PANIX - Customizable Linux Persistence Tool for Security Research and Detection Engineering - Explore on GitHub

vmware.github.io/photon/ - VMware's Photon OS project - Explore on GitHub

atenreiro/opensquat - Tool for detecting domain look-alikes and brand impersonation - Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog