Seclog - #115


"When all defenses fail, the art of survival is in your ability to disappear without a trace." - The Art of Cyber War
📚 SecMisc
📰 SecLinks
Prompt Injection Attacks for Dummies - A comprehensive guide to understanding and preventing prompt injection attacks. Read More
Credmaster2 - WhyNotSecurity - Exploring Gmail user enumeration techniques. Read More
An 18 years old bug - An analysis of a long-standing vulnerability. Read More
Using Mind Maps in Application Security Testing - Enhancing security testing with mind maps. Read More
How to gain code execution on millions of people and hundreds of popular apps - Uncovering mass exploitation techniques. Read More
Ranking MFA Methods - From Least to Most Secure - A comparative analysis of MFA methods. Read More
Substack Domain Takeover - Investigating a domain takeover vulnerability. Read More
SOTI Security Defenders’ Guide 2025 - Insights into 2025 cybersecurity trends. Read More
How to Hack AI Agents and Applications - Tactics for exploiting AI systems. Read More
Evil Crow RF: A Portable Radio Frequency Device - Exploring RF hacking tools. Read More
An iCloud Backdoor Would Make Our Phones Less Safe - Analysis of potential iCloud vulnerabilities. Read More
Bybit Hack Report - An in-depth look at the Bybit hack. Read More
- Safe{Wallet} Statement on Targeted Attack on Bybit - Official response to the Bybit attack. Read More
GitLab Account Takeover via Password Reset - A HackerOne report on a critical vulnerability. Read More
OWASP LLM Exploit Generation v1.0 - A guide to LLM & AI security risks. Read More
Pwn everything Bounce everywhere all at once (part 2) - Advanced exploitation techniques. Read More
🐦 SecX
Grok Web App Security - Enhancements in Content Security Policy to prevent data leakage. Read More
Lazarus Draining 1.5 Billion - Analysis of the malicious JS attack on Safe{Wallet}. Read More
💻 SecGit
CVE-2025-25279 - Details on a critical vulnerability. Explore on GitHub
Wayback Machine OSINT Framework - Chronos for historical OSINT. Explore on GitHub
Camtruder - Advanced RTSP camera discovery tool. Explore on GitHub
1-Line RAT - Reverse remote shell access via browser. Read More
FuzzyAI - Automated LLM fuzzing tool. Explore on GitHub
TruffleHog Explorer - Web-based tool for TruffleHog data analysis. Explore on GitHub
For suggestions and any feedback, please contact: securify@rosecurify.com
Subscribe to my newsletter
Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
