Rosecurify

Seclog - #87

๐Ÿ“š SecMisc #

Sploitify - A tool for security researchers and penetration testers. Read More

The DEF CONยฎ Media Server - Archives of the DEF CON 32 conference presentations. Read More

Game Hacking Academy - A resource for learning game hacking techniques. Read More

Practical Cryptography for Developers - A comprehensive guide to cryptography for developers. Read More

Hacking Beyond.com โ€” Enumerating Private TLDs - An exploration of enumerating private top-level domains. Read More

Listen to the whispers: web timing attacks that actually work - A deep dive into effective web timing attacks. Read More

Wormable Substack XSS - An analysis of a cross-site scripting vulnerability on Substack. Read More

Insights and highlights from DEF CON 32 - Key takeaways from the DEF CON 32 conference. Read More

Introducing Ghost Keys - A new feature in Freenet for enhanced privacy. Read More

Gotta cache 'em all: bending the rules of web cache exploitation - Techniques for exploiting web caches. Read More

Multi-Tenant Architectures with AWS Cognito - A guide to implementing multi-tenant architectures using AWS Cognito. Read More

๐ŸŽฅ SecVideo #

Jeff Man: From NSA to Pentesting - An interview with Jeff Man about his journey from the NSA to penetration testing. Watch Here

๐Ÿ’ป SecGit #

EgeBalci/proton-poc - A proof of concept Proton CAPTCHA solver. Explore on GitHub

dshieble/playwright_xss_scanner - A tool for scanning XSS vulnerabilities using Playwright. Explore on GitHub

aws/karpenter-provider-aws - Karpenter, a Kubernetes Node Autoscaler for AWS. Explore on GitHub

gmatuz/inthewilddb - An hourly updated database of exploit and exploitation reports. Explore on GitHub

doyensec/CSPTBurpExtension - A Burp Suite extension for finding and exploiting Client-Side Path Traversal. Explore on GitHub

mbrg/power-pwn - An offensive security toolset for Microsoft 365 focusing on Copilot and Power Platform. Explore on GitHub

BushidoUK/Ransomware-Tool-Matrix - A resource listing tools used by various ransomware gangs. Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: securify@rosecurify.com

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog