Seclog - #131


"The enemy does not care what systems were in scope for testing. Protect your weak points." - The Art of Cyber War
π SecMisc
Cloud-Attack Techniques β Interactive matrix of cloud-attack techniques and mitigations. Read More
Every UUID V4 β Generate, decode, and validate version-4 UUIDs in one click. Read More
BloodHound Query Library β Curated Cypher queries for BloodHound neo4j graphs. Read More
π° SecLinks
InfoPΓͺxwas: How They Pick Your Digital Pockets Without You Noticing β Modern info-stealing tactics in the wild. Read More
SugarCRM Vulnerability β SugarCRM <= 6.5.23 (SugarRestSerialize.php) PHP Object Injection Vulnerability allows unauthenticated attackers to execute arbitrary PHP code via specially crafted serialized objects. Read More
A Bit More on Twitter/Xβs New Encrypted Messaging β Deeper cryptographic analysis of Xβs E2EE beta. Read More
Ghidra Is Best: Android Reverse Engineering β Hands-on guide to reversing Android apps with Ghidra. Read More
Escaping β<β and β>β in Attributes β How tiny escapes thwart mutation-XSS. Read More
CVE-2025-34508: Path Traversal in ZendTo β End-to-end exploit walk-through and detection tips. Read More
Is b for Backdoor? Pre-Auth RCE Chain in Sitecore XP β WatchTowrβs deep dive into a sneaky exploit chain. Read More
Defending the Internet: Cloudflare Blocks a 7.3 Tbps DDoS β Behind the scenes of record-breaking mitigation. Read More
Cloud Hash Cracking Economics β Combines Hashtopolis and Cloudflare Tunnel for cost-effective distributed cracking without hardware investments. Read More
Go Parser Security Footguns β Highlights unexpected risks in Goβs JSON/XML/YAML parsers, including data exposure and format confusion exploits. Read More
Insomnia API Client Template Injection β Uncovers vulnerabilities in developer tools used during offensive security assessments. Read More
π¦ SecX
Zoom Phishing via App Absence β Warns that victims fall for impersonators directing to fake Zoom links (e.g., Z0om.com) partly due to lacking the native app, which should trigger suspicion. Watch Here
Prompt Injection Mimicry Tactics β Effective prompt injection mimics the modelβs training data format for higher success rates. Watch Here
π₯ SecVideo
Parser Differentials: When Interpretation Becomes a Vulnerability β OffensiveCon 25 talk by Joernchen. Watch Here
Google Cloud CISO: Shift Down not Left, 4 Ways Google Uses AI for Security β Phil Venables on AI-driven defense. Watch Here
π» SecGit
nuryslyrt/AISecTips-Tricks β Handy AI-powered security tips & scripts. Explore on GitHub
Ghostcrew β Ghostcrew is an all-in-one offensive security toolbox with AI agent and MCP architecture, integrating tools like Nmap, Metasploit, and FFUF. Explore on GitHub
Fakjs β Fakjs is a fast Go-based tool to uncover sensitive information in JavaScript files, playing a crucial role in reconnaissance during security assessments. Explore on GitHub
Threat Designer β Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design. Explore on GitHub
Paragon β Paragon is a web-based checklist-driven note-taking app following bug bounty and web app pentest methodology. Explore on GitHub
For suggestions and any feedback, please contact: securify@rosecurify.com
Subscribe to my newsletter
Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
