Seclog - #99

ยท

2 min read

"To deceive your enemy, make your vulnerabilities appear as your strengths." - The Art of Cyber War

๐Ÿ“š SecMisc

  • Movies for Hackers - A curated list of movies that hackers would enjoy - Read More

๐Ÿ“ฐ SecLinks

  • Hacking 700 Million Electronic Arts Accounts - An analysis of how EA accounts were compromised - Read More

  • Building a Keylogger Browser Extension - Tutorial on creating a browser extension keylogger - Read More

  • Understanding Round Robin DNS - Comprehensive guide to Round Robin DNS systems - Read More

  • Engineering WCF Hacks - Deep dive into WCF .NET.TCP penetration testing - Read More

  • Offensively Groovy - TrustedSec's analysis of offensive security using Groovy - Read More

  • Upcoming Hardening in PHP - Overview of new security features in PHP - Read More

  • Beyond RCE: Autonomous Code Execution in Agentic AI - Research on AI security implications - Read More

  • Amazon CloudFront WAF Billing Update - Changes to AWS WAF billing structure - Read More

๐Ÿฆ SecX

  • Stack Smashing Anniversary - Historical reflection on the famous "Smashing The Stack For Fun And Profit" article - Read More

  • LLMs and Vulnerability Research - Analysis of AI's role in security research - Read More

  • FastJSON Exploit Discovery - New exploit found for CVE-2022-25845 in Spring - Read More

  • WAF Bypass Technique - Novel approach to bypassing path-based WAF restrictions - Read More

  • XSS Research - Interesting findings in XSS vulnerability research - Read More

๐Ÿ’ป SecGit

  • RFHunter - Tool for detecting hidden cameras in AirBNBs - GitHub

  • SASTSweep - Automated vulnerability detection and repository analysis tool - GitHub

  • Reaper - Ghost Security's new security tool - GitHub

  • PFZF - Context-aware code selection tool for LLM workflows - GitHub

For suggestions and any feedback, please contact: securify@rosecurify.com

ย