Rosecurifylog.rosecurify.com·Oct 12, 2024Seclog - #95📰 SecLinks Project Zero: Effective Fuzzing: A Dav1d Case Study - Exploring effective fuzzing techniques using Dav1d as a case study. Read More Google Online Security Blog: Using Chrome's accessibility APIs to find security bugs - How Chrome's acce...Discuss·32 readsseclogseclog
Rosecurifylog.rosecurify.com·Oct 5, 2024Seclog - #94📚 SecMisc Tools Index | Hackers of India - A comprehensive index of hacking tools. Read More Unleash the Power of Censys Search - A guide for using Censys search effectively. Read More Lambda Watchdog - A monitoring tool for AWS Lambda functions....DiscussseclogCVE-2024-45409
Rosecurifylog.rosecurify.com·Sep 28, 2024Seclog - #93📚 SecMisc Open Source Insights - A tool for analyzing open-source dependencies - Read More sigmalite - A lightweight security analysis tool - Read More 📰 SecLinks Insecurity through Censorship - Vulnerabilities Caused by The Great Firewall - R...Discuss·1 likeseclogSecurity
Rosecurifylog.rosecurify.com·Sep 22, 2024Seclog - #92"In the digital age, the supreme art of war is to secure one's own data while making the enemy doubt theirs." - The Art of Cyber War 📚 SecMisc CellGuard - Introduction to a mobile security project - Read More Introduction to Security - Cybersecuri...Discussseclogseclog
Rosecurifylog.rosecurify.com·Sep 15, 2024Seclog - #91"Build your network as you would a fortress; with layers, deception, and traps for the unwary." - The Art of Cyber War 📚 SecMisc bug.directory - Description not provided - Read More x86re - Description not provided - Read More 📰 SecLinks GAZEp...DiscussseclogSecurity
Rosecurifylog.rosecurify.com·Sep 8, 2024Seclog - #90"Never let your enemy know your next move, especially if it's turning the router off and on again." - The Art of Cyber War 📚 SecMisc Living Off the Living Off the Land | LOLOL - A resource for living off the land techniques - Read More shell.how ...Discussseclogseclog
Rosecurifylog.rosecurify.com·Aug 31, 2024Seclog - #89📰 SecLinks Is Telegram really an encrypted messaging app? - Exploring the security claims and encryption practices of Telegram messaging app. Read More Reading PCAP Files (Directly) With DuckDB - Tutorial on analyzing network capture files using D...DiscussseclogSecurity
Rosecurifylog.rosecurify.com·Aug 25, 2024Seclog - #88📚 SecMisc Surveillance Watch: They Know Who You Are - Explore surveillance technologies and their implications. Read More Make Firefox Private Again - Learn how to enhance your Firefox browser's privacy settings. Read More 📰 SecLinks Phrack Ma...Discussseclogseclog
Rosecurifylog.rosecurify.com·Aug 18, 2024Seclog - #87📚 SecMisc Sploitify - A tool for security researchers and penetration testers. Read More The DEF CON® Media Server - Archives of the DEF CON 32 conference presentations. Read More Game Hacking Academy - A resource for learning game hacking techni...DiscussseclogSecurity
Rosecurifylog.rosecurify.com·Aug 11, 2024Seclog - #86📚 SecMisc GhostWrite - Explore advanced attack techniques with GhostWrite. - Read More Welcome to Gallipoli Community! – Gallipoli – A hacker saved my life - Discover the Gallipoli community and learn how hacking can change lives. - Read More pri...Discussseclogseclog