What is this and why does it exist?

All links, the content behind and the opinions there are not mine.
If you follow an external link, it is your problem, not mine if you do not like, what you find there.
Please be aware, that this is just a list of topics I find interesting.

All mentioned security tools can be found here:


A testing framework for automatically finding and simplifying bugs in graphics shader compilers
–> graphicsfuzz - github <–

MAC address age tracking
–> mac-ages - github <–

A collection of awesome lists, manuals, blogs, hacks, one-liners and tools for Awesome Ninja Admins
–> awesome-ninja-admins - github <–

Sourcegraph is now open source
–> Sourcegraph - Sourcegraph <–

Talks & Knowledge

Announcing password-less login, identity governance, and more for Azure Active Directory
–> Azure password-less login - Azure Active Directory Identity Blog <–

Four Ways to Bypass Android SSL Verification and Certificate Pinning
–> Bypass Android SSL and Cert pinning - NETSPI <–

Stringless YARA Rules
–> Stringless YARA Rules - InQuest Blog <–

YARA Performance Guidelines
–> YARA Performance Guidelines - github <–


New Linux Kernel Bug Affects Red Hat, CentOS, and Debian Distributions
–> CVE-2018-14634 - The Hacker News <–

OWASP Joomla Vulnerability Scanner Project
–> JoomScan 0.0.7 - KitPloit <–

Erstes UEFI-Rootkit von Sednit-Hackern
–> LoJax - eset <–

Telegram Leaks User IP Addresses
–> Telegram Leaks User IP Addresses - SecurityWeek <–

Dark web azorult generator offers free binaries to cybercrooks
–> azorult generator - ThreatPost <–

Popular TP-Link Router is Vulnerable to Remote Exploitation
–> CVE-2018-15702 - Tenable <–