Rosecurify

Seclog - #20

CodeQL zero to hero part 1: the fundamentals of static analysis for vulnerability research

Get your passwords organized

Cognitive Biases in Hacking

Who reads your email?

Joomla! CVE-2023-23752 to Code Execution

BingBang: AAD misconfiguration led to Bing.com results manipulation and account takeover

From an Innocent api-key to PII data

Vulnerabilities 1001: C-Family Software Implementation Vulnerabilities

OGNL Injection Decoded

Negotiating With Internal Security Teams

Attack Techniques: Open Redirectors, CAPTCHAs, Site Proxies, and IPFS, oh my

Application of ChatGPT in Cybersecurity

Home | World Backup Day โ€” March 31st

Threat modeling life: Prepping for the rest of us with Michal Zalewski (lcamtuf)

Fun With Custom URI Schemes

secvideo #

NEAR SC Security Course

DNS Remote Code Execution: Finding the Vulnerability ๐Ÿ‘พ (Part 1)

Cloud Hacking: The Basics

secgit #

svenmorgenrothio/Prompt-Injection-Playground

wiz-sec/open-cvdb

0xacb/recollapse

Shell-Company/QRExfil

3CORESec/testmynids.org

fipso/ccurl.sh

BC-SECURITY/Beginners-Guide-to-Obfuscation


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: securify@rosecurify.com

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog