Rosecurify

Seclog - #97

Blog - Security research on Private Cloud Compute - Detailed research on Apple's Private Cloud Compute security infrastructure. Read More

Against /tmp - An analysis of temporary directory security considerations. Read More

Lose your device, but keep your keys - Exploring threshold signatures for key security. Read More

Bluetooth Low Energy GATT Fuzzing - Deep dive into BLE security testing. Read More

Using Nix to Fuzz Test a PDF Parser - Tutorial on implementing fuzz testing with Nix. Read More

Reconnaissance: Azure Cloud - Guide to Azure cloud reconnaissance techniques. Read More

LLM Penetration Testing Checklist - Comprehensive guide for testing LLM security. Read More

Company forced to change name that could be used to hack websites - Interesting case of security implications in company naming. Read More

๐ŸŽฅ SecVideo #

DEF CON 32 - Counter Deception: Defending Yourself in a World Full of Lies - Insights on defending against deception tactics. Watch Here

๐Ÿ’ป SecGit #

vulnhuntr - Zero shot vulnerability discovery tool using LLMs. Explore on GitHub

AuthzAI - Authorization testing tool using AI. Explore on GitHub

rfhunter - Device for detecting hidden cameras in rental properties. Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog