Seclog - #89

ยท

2 min read

Seclog - #89

Photo by Yusuf Onuk on Unsplash

  • Is Telegram really an encrypted messaging app? - Exploring the security claims and encryption practices of Telegram messaging app. Read More

  • Reading PCAP Files (Directly) With DuckDB - Tutorial on analyzing network capture files using DuckDB for efficient data processing. Read More

  • Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access - Presentation on identifying and exploiting vulnerabilities in cloud infrastructure for unauthorized access. Read More

  • Mobile Reverse Engineering 101 - Comprehensive guide to understanding and practicing mobile application reverse engineering techniques. Read More

  • Audit of Airswift's Supply Chain Financing - Detailed security analysis of Airswift's financial system, focusing on potential vulnerabilities. Read More

  • Bypassing airport security via SQL injection - Exploration of SQL injection vulnerabilities in airport security systems and their potential impact. Read More

  • Flipping Pages: An analysis of a new Linux vulnerability in nf_tables - In-depth analysis of a newly discovered Linux security flaw and associated exploitation techniques. Read More

  • DNSFS: Store your files in others DNS resolver caches - Innovative approach to distributed file storage leveraging DNS resolver caches. Read More

  • Analysis of CVE-2024-43044 - Comprehensive breakdown of a critical security vulnerability, its implications, and mitigation strategies. Read More

  • How Hackers love you HTTP data - Insights into how hackers exploit HTTP data for malicious purposes. Read More

๐Ÿ’ป SecGit

  • storax/kubedoom: Kill Kubernetes pods by playing Id's DOOM! - A unique way to manage Kubernetes pods through a game interface. Explore on GitHub

  • coder/wush: simplest & fastest way to transfer files between computers via wireguard - Efficient file transfer tool using Wireguard. Explore on GitHub

  • sinsinology/CVE-2024-6670 - Repository related to a specific CVE, likely containing exploit or analysis information. Explore on GitHub

For suggestions and any feedback, please contact: securify@rosecurify.com

ย