"Build your network as you would a fortress; with layers, deception, and traps for the unwary." - The Art of Cyber War
📚 SecMisc
bug.directory - Description not provided - Read More
x86re - Description not provided - Read More
📰 SecLinks
GAZEploit - Description not provided - Read More
OR 1=1 -- is Dying - Exploring the decline of a common SQL injection technique - Read More
OpenAI o1-preview vs Claude 3.5 Sonnet comparison - A comparative analysis of AI models - Read More
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI - An unexpected cybersecurity discovery - Read More
Scorecarding Security - A method for evaluating security measures - Read More
Microsoft Copilot: From Prompt Injection to Exfiltration of Personal Information - Exploring vulnerabilities in AI assistants - Read More
Cracking OneDrive's Personal Vault - Investigating security measures of cloud storage - Read More
htmx ~ Web Security Basics (with htmx) - Web security fundamentals for htmx users - Read More
Browser Stored Credentials – Purple Team - Exploring browser security from a Purple Team perspective - Read More
Security has too many tools - by Frank Wang - Discussing the overabundance of security tools - Read More
Exploiting JavaScript Interface for Unauthorized Access in a 'global' cryptocurrency exchange android app - A case study in mobile app security - Read More
SSH Keystroke Obfuscation Bypass - Techniques for bypassing SSH security measures - Read More
Defend against vampires with 10 gbps network encryption - High-speed network security solutions - Read More
🐦 SecX
- Ryan Naraine on X: "An Ivanti 0day story in two parts 😰" - Discussing a newly discovered vulnerability - Read More
🎥 SecVideo
Fuzzing from First Principles with Alisa Esage - An introduction to fuzzing techniques - Watch Here
[D24] Have U Been Invited (episode 2) - MacOS Logic Bugs - Mikko Kenttälä - Exploring MacOS vulnerabilities - Watch Here
💻 SecGit
c-skills/passport - Description not provided - Explore on GitHub
dadevel/impacket-zsh-integration - ZSH integration for Impacket - Explore on GitHub
alexdhital/Infiltrax - Post-exploitation reconnaissance tool for penetration testers and red teams - Explore on GitHub
josh0xA/darkdump - Open Source Intelligence Interface for Deep Web Scraping - Explore on GitHub
grahamhelton/USP - Linux persistence tool using udev rules - Explore on GitHub
Aegrah/PANIX - Customizable Linux Persistence Tool for Security Research and Detection Engineering - Explore on GitHub
vmware.github.io/photon/ - VMware's Photon OS project - Explore on GitHub
atenreiro/opensquat - Tool for detecting domain look-alikes and brand impersonation - Explore on GitHub
For suggestions and any feedback, please contact: securify@rosecurify.com