๐ฐ SecLinks
Blog - Security research on Private Cloud Compute - Detailed research on Apple's Private Cloud Compute security infrastructure. Read More
Against /tmp - An analysis of temporary directory security considerations. Read More
Lose your device, but keep your keys - Exploring threshold signatures for key security. Read More
Bluetooth Low Energy GATT Fuzzing - Deep dive into BLE security testing. Read More
Using Nix to Fuzz Test a PDF Parser - Tutorial on implementing fuzz testing with Nix. Read More
Reconnaissance: Azure Cloud - Guide to Azure cloud reconnaissance techniques. Read More
LLM Penetration Testing Checklist - Comprehensive guide for testing LLM security. Read More
Company forced to change name that could be used to hack websites - Interesting case of security implications in company naming. Read More
๐ฅ SecVideo
- DEF CON 32 - Counter Deception: Defending Yourself in a World Full of Lies - Insights on defending against deception tactics. Watch Here
๐ป SecGit
vulnhuntr - Zero shot vulnerability discovery tool using LLMs. Explore on GitHub
AuthzAI - Authorization testing tool using AI. Explore on GitHub
rfhunter - Device for detecting hidden cameras in rental properties. Explore on GitHub
For suggestions and any feedback, please contact: securify@rosecurify.com