Rosecurify

Seclog - #99

"To deceive your enemy, make your vulnerabilities appear as your strengths." - The Art of Cyber War

๐Ÿ“š SecMisc

Movies for Hackers - A curated list of movies that hackers would enjoy - Read More

๐Ÿ“ฐ SecLinks

Hacking 700 Million Electronic Arts Accounts - An analysis of how EA accounts were compromised - Read More

Building a Keylogger Browser Extension - Tutorial on creating a browser extension keylogger - Read More

Understanding Round Robin DNS - Comprehensive guide to Round Robin DNS systems - Read More

Engineering WCF Hacks - Deep dive into WCF .NET.TCP penetration testing - Read More

Offensively Groovy - TrustedSec's analysis of offensive security using Groovy - Read More

Upcoming Hardening in PHP - Overview of new security features in PHP - Read More

Beyond RCE: Autonomous Code Execution in Agentic AI - Research on AI security implications - Read More

Amazon CloudFront WAF Billing Update - Changes to AWS WAF billing structure - Read More

๐Ÿฆ SecX

Stack Smashing Anniversary - Historical reflection on the famous "Smashing The Stack For Fun And Profit" article - Read More

LLMs and Vulnerability Research - Analysis of AI's role in security research - Read More

FastJSON Exploit Discovery - New exploit found for CVE-2022-25845 in Spring - Read More

WAF Bypass Technique - Novel approach to bypassing path-based WAF restrictions - Read More

XSS Research - Interesting findings in XSS vulnerability research - Read More

๐Ÿ’ป SecGit

RFHunter - Tool for detecting hidden cameras in AirBNBs - GitHub

SASTSweep - Automated vulnerability detection and repository analysis tool - GitHub

Reaper - Ghost Security's new security tool - GitHub

PFZF - Context-aware code selection tool for LLM workflows - GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog