What is this and why does it exist?

All links, the content behind and the opinions there are not mine.
If you follow an external link, it is your problem, not mine if you do not like, what you find there.
Please be aware, that this is just a list of topics I find interesting.

All mentioned security tools can be found here:


–> PoC||GTFO - github <–

A collection of open source and commercial tools that aid in red team operations.
–> Red-Teaming-Toolkit - github <–

Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques
–> WinPwnage - github <–

C++ python bytecode disassembler and decompiler
–> pycdc - github <–

Kali Linux 2018-02
–> Kali Linux 2018-02 - <–

Moving Fast and Securing Things
–> The SDL at Slack and goSDL - Slack <–

Talks & Knowledge

Securing Email
–> Securing Email - <–

Further Advancements in Detecting Kernel Infoleaks with x86 Emulation
–> Bochspwn Revolutions - @j00ru <–

Exploiting Branch Target Injection
–> Exploiting Branch Target Injection - Jann Horn / Google Project Zero <–

Defense in Depth: Detonation Technologies
–> Detonation Tech - InQuest Blog <–

Return Flow Guard Using Control Stack Identified By Processor Register
–> Return Flow Guard - Google Patents <–


7-Zip: From Uninitialized Memory to Remote Code Execution
–> 7zip Remote Code Exec - landave’s blog <–

CVE-2018-873X - NagiosXI Vulnerability Chaining; Death By a Thousand Cuts
–> CVE-2018-873X - Redacted Security Blog <–

USB Sticks Can Trigger BSOD - Even On A Locked Device
–> BSOD using USB Stick - Threat Post <–

GravityRAT malware evades detection and targets users in India
–> GravityRAT malware - HackRead <–

inb4 this is going to be used for phishing
–> Custom domains on GitHub Pages gain support for HTTPS - x0rz / Twitter <–

Multiple Vulnerabilities in PHP Could Allow for Arbitrary Code Execution
–> MS-ISAC Advisory Nr: 2018-046 - CIS <–