What is this and why does it exist?

All links, the content behind and the opinions there are not mine.
If you follow an external link, it is your problem, not mine if you do not like, what you find there.
Please be aware, that this is just a list of topics I find interesting.

All mentioned security tools can be found here:


The Yuki Chan is an Automated Penetration Testing tool this tool will auditing all standard security test method for you.
–> Yuki Chan - github <–

Lighthouse - Code Coverage Explorer for IDA Pro
–> Lighthouse - github <–

A project for allowing EDK-II Development with Visual Studio
–> VisualUefi - github <–

Adlice PEViewer - The best PE analysis toolkit
–> Adlice PEViewer - Adlice <–

MalShare - Now with search
–> MalShare - MalShare <–

Introducing Nzyme: WiFi Monitoring, Intrusion Detection And Forensics
–> Nzyme - <–

Talks & Knowledge

Breaking DKIM - on Purpose and by Chance
–> Breaking DKIM - noxxi <–

Over The Air - Vol. 2, Pt. 1: Exploiting The Wi-Fi Stack on Apple Devices
–> Exploiting Wi-Fi on Apple - Project Zero <–

Intro to Analyze NFC Payment Methods & Contactless Cards
–> Analyzing NFC Payment - SALVADOR MENDOZA BLOG <–

SELinux in Android Oreo or: How I Learned to Stop Worrying and Love Attributes
–> SELinux in Android Oreo - Linux Foundation <–

Automated Opaque Predicate Removal
–> Automated Opaque Predicate Removal - BinaryNinja <–

Decentralized P2P Websites: ZeroNet
–> ZeroNet - <–

Apple just open sourced every iOS and macOS kernel to date.
–> Apple Open Source - Apple <–

Gas Pump Skimmers
–> Detect Skimmers using Android - Sparkfun <–


Behind the Masq: Yet more DNS, and DHCP, vulnerabilities
–> dnsmasq vulns - Google Security Blog <–