Seclog - #99
"To deceive your enemy, make your vulnerabilities appear as your strengths." - The Art of Cyber War
๐ SecMisc
- Movies for Hackers - A curated list of movies that hackers would enjoy - Read More
๐ฐ SecLinks
Hacking 700 Million Electronic Arts Accounts - An analysis of how EA accounts were compromised - Read More
Building a Keylogger Browser Extension - Tutorial on creating a browser extension keylogger - Read More
Understanding Round Robin DNS - Comprehensive guide to Round Robin DNS systems - Read More
Engineering WCF Hacks - Deep dive into WCF .NET.TCP penetration testing - Read More
Offensively Groovy - TrustedSec's analysis of offensive security using Groovy - Read More
Upcoming Hardening in PHP - Overview of new security features in PHP - Read More
Beyond RCE: Autonomous Code Execution in Agentic AI - Research on AI security implications - Read More
Amazon CloudFront WAF Billing Update - Changes to AWS WAF billing structure - Read More
๐ฆ SecX
Stack Smashing Anniversary - Historical reflection on the famous "Smashing The Stack For Fun And Profit" article - Read More
LLMs and Vulnerability Research - Analysis of AI's role in security research - Read More
FastJSON Exploit Discovery - New exploit found for CVE-2022-25845 in Spring - Read More
WAF Bypass Technique - Novel approach to bypassing path-based WAF restrictions - Read More
XSS Research - Interesting findings in XSS vulnerability research - Read More
๐ป SecGit
RFHunter - Tool for detecting hidden cameras in AirBNBs - GitHub
SASTSweep - Automated vulnerability detection and repository analysis tool - GitHub
Reaper - Ghost Security's new security tool - GitHub
PFZF - Context-aware code selection tool for LLM workflows - GitHub
For suggestions and any feedback, please contact: securify@rosecurify.com
Subscribe to my newsletter
Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by