What is this and why does it exist?

All links, the content behind and the opinions there are not mine.
If you follow an external link, it is your problem, not mine if you do not like, what you find there.
Please be aware, that this is just a list of topics I find interesting.

All mentioned security tools can be found here:


Popular repositories of SadProcessor
–> SadProcessor - github <–

BabySploit Beginner Pentesting Toolkit/Framework Written in Python
–> BabySploit - github <–

A penetration testing framework for Linux, MacOS, and Windows systems
–> DarkSpiritz - github <–

MSDAT: Microsoft SQL Database Attacking Tool
–> msdat - github <–

Talks & Knowledge

Writing Optimized Windows Shellcode in C
–> PIC_Bindshell - Exploit Monday <–

Quickpost: Compiling 32-bit Static ELF Files on Kali
–> EICARgen build on Kali - Didier Stevens <–

Microsoft Enhances Windows Defender ATP
–> Defender ATP - SecurityWeek <–

Peering Inside the PE: A Tour of the Win32 Portable Executable File Format
–> Peering Inside the PE - Microsoft DevNetwork <–

OWASP Sting: How Education Can Take the Bite out of Common Vulnerabilities
–> OWASP S.T.I.N.G Project - OWASP <–

The Easiest Metasploit Guide You’ll Ever Read
–> Easiest Metasploit Guide - <–


DirtyCOW is back in backdoor attack targeting Drupal Web Servers
–> DirtyCOW is back - SC Magazine <–

iKeyMonitor Spy App for iPhone and Android: Best Remote Monitoring Tool
–> iKeyMonitor - HackRead <–

Yet another memory leak in ImageMagick or how to exploit CVE-2018–16323
–> CVE-2018–16323 - Medium <–

“DarkGate” malware uses Akamai, AWS DNS records and multiple payloads for cryptomining, credential theft and endpoint takeover.
–> DarkGate malware - HackRead <–