Seclog - #97
๐ฐ SecLinks #
Blog - Security research on Private Cloud Compute - Detailed research on Apple's Private Cloud Compute security infrastructure. Read More
Against /tmp - An analysis of temporary directory security considerations. Read More
Lose your device, but keep your keys - Exploring threshold signatures for key security. Read More
Bluetooth Low Energy GATT Fuzzing - Deep dive into BLE security testing. Read More
Using Nix to Fuzz Test a PDF Parser - Tutorial on implementing fuzz testing with Nix. Read More
Reconnaissance: Azure Cloud - Guide to Azure cloud reconnaissance techniques. Read More
LLM Penetration Testing Checklist - Comprehensive guide for testing LLM security. Read More
Company forced to change name that could be used to hack websites - Interesting case of security implications in company naming. Read More
๐ฅ SecVideo #
DEF CON 32 - Counter Deception: Defending Yourself in a World Full of Lies - Insights on defending against deception tactics. Watch Here
๐ป SecGit #
vulnhuntr - Zero shot vulnerability discovery tool using LLMs. Explore on GitHub
AuthzAI - Authorization testing tool using AI. Explore on GitHub
rfhunter - Device for detecting hidden cameras in rental properties. Explore on GitHub
Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.
For any suggestions or feedback, please contact us at: [email protected]Subscribe to Seclog
Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.
No spam. Only high-security insights. Unsubscribe at any time.