What is this and why does it exist?

All links, the content behind and the opinions there are not mine.
If you follow an external link, it is your problem, not mine if you do not like, what you find there.
Please be aware, that this is just a list of topics I find interesting.

All mentioned security tools can be found here:


Binary coverage tool without binary modification for Windows
–> mesos - github <–

A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system
–> windowsblindread - github <–

Security analysis toolkit for proprietary car protocols
–> CANalyzat0r - github <–

KSOCKET provides a very basic example on how to make a network connections in the Windows Driver by using WSK
–> KSOCKET - github <–

Gorsair hacks its way into remote docker containers that expose their APIs
–> Gorsair - github <–

A PowerShell TCP/IP swiss army knife
–> PowerCat - github <–

Library Function Identification
–> idenLib - github <–

Rubeus is a C# toolset for raw Kerberos interaction and abuses
–> Rubeus - github <–

A tool designed to traverse phishing URL paths to search for phishing kit source code
–> phishfinder - github <–

Cowrie SSH/Telnet Honeypot
–> cowrie - github <–

Talks & Knowledge

Announcing the new Security Engineering website
–> Security Engineering Portal - Microsoft Secure <–

Responder and Snarf
–> Responder and Snarf - ijustwannaredteam <–

This repository contains the implementations of the paper “Practical Enclave Malware with Intel SGX”.
–> sgxrop - github <–


runc container breakout (all versions)
–> CVE-2019-5736 - openwall <–

Schwachstelle in RSYSLOG ermöglicht Denial-of-Service-Angriff
–> CVE-2018-16881 - DFN-CERT <–

First clipper malware discovered on Google Play
–> clipper malware - welivesecurity <–