Rosecurifylog.rosecurify.com路Nov 17, 2024Seclog - #100"The enemy does not check your risk register prior to attacking." - Sun Tzu, The Art of Cyber War 馃摎 SecMisc PoisonTap - Exploiting locked computers through USB peripherals, demonstrating techniques to bypass security measures on locked machines. Re...DiscussseclogBlueHat2024
Rosecurifylog.rosecurify.com路Nov 9, 2024Seclog - #99"To deceive your enemy, make your vulnerabilities appear as your strengths." - The Art of Cyber War 馃摎 SecMisc Movies for Hackers - A curated list of movies that hackers would enjoy - Read More 馃摪 SecLinks Hacking 700 Million Electronic Arts Acco...Discussseclogbrowser hacking
Rosecurifylog.rosecurify.com路Nov 3, 2024Seclog - #98鈥淚f you know your network and your systems, you need not fear the result of a hundred cyber battles." - Sun Tzu, The Art of Cyber War 馃摎 SecMisc GPS Signal Spoofing - Overview of GPS spoofing threats and mitigation techniques. Read More 馃摪 SecLink...Discussseclogseclog
Rosecurifylog.rosecurify.com路Oct 26, 2024Seclog - #97馃摪 SecLinks Blog - Security research on Private Cloud Compute - Detailed research on Apple's Private Cloud Compute security infrastructure. Read More Against /tmp - An analysis of temporary directory security considerations. Read More Lose your de...Discussseclog#cybersecurity
Rosecurifylog.rosecurify.com路Oct 12, 2024Seclog - #95馃摪 SecLinks Project Zero: Effective Fuzzing: A Dav1d Case Study - Exploring effective fuzzing techniques using Dav1d as a case study. Read More Google Online Security Blog: Using Chrome's accessibility APIs to find security bugs - How Chrome's acce...Discuss路40 readsseclogseclog
Rosecurifylog.rosecurify.com路Oct 5, 2024Seclog - #94馃摎 SecMisc Tools Index | Hackers of India - A comprehensive index of hacking tools. Read More Unleash the Power of Censys Search - A guide for using Censys search effectively. Read More Lambda Watchdog - A monitoring tool for AWS Lambda functions....DiscussseclogCVE-2024-45409
Rosecurifylog.rosecurify.com路Sep 28, 2024Seclog - #93馃摎 SecMisc Open Source Insights - A tool for analyzing open-source dependencies - Read More sigmalite - A lightweight security analysis tool - Read More 馃摪 SecLinks Insecurity through Censorship - Vulnerabilities Caused by The Great Firewall - R...Discuss路1 likeseclogSecurity
Rosecurifylog.rosecurify.com路Sep 22, 2024Seclog - #92"In the digital age, the supreme art of war is to secure one's own data while making the enemy doubt theirs." - The Art of Cyber War 馃摎 SecMisc CellGuard - Introduction to a mobile security project - Read More Introduction to Security - Cybersecuri...Discussseclogseclog
Rosecurifylog.rosecurify.com路Sep 15, 2024Seclog - #91"Build your network as you would a fortress; with layers, deception, and traps for the unwary." - The Art of Cyber War 馃摎 SecMisc bug.directory - Description not provided - Read More x86re - Description not provided - Read More 馃摪 SecLinks GAZEp...DiscussseclogSecurity
Rosecurifylog.rosecurify.com路Sep 8, 2024Seclog - #90"Never let your enemy know your next move, especially if it's turning the router off and on again." - The Art of Cyber War 馃摎 SecMisc Living Off the Living Off the Land | LOLOL - A resource for living off the land techniques - Read More shell.how ...Discussseclogseclog