What is this and why does it exist?

All links, the content behind and the opinions there are not mine.
If you follow an external link, it is your problem, not mine if you do not like, what you find there.
Please be aware, that this is just a list of topics I find interesting.

All mentioned security tools can be found here:


Windows Exploit Suggester - Next Generation
–> wesng - github <–

Talks & Knowledge

Fuzzing Adobe Reader for exploitable vulns (fun != profit)
–> Fuzzing Adobe Reader - kciredor’s information security blog <–

Automated Security Analysis AWS Clouds
–> Automated Security Analysis AWS Clouds - andresriancho <–

Different methods to run a command line via Excel file in order to spawn a Meterpreter reverse shell
–> MS Excel Weaponization Techniques - Medium <–


Cellular networks flaws expose 4G & 5G devices to IMSI capturing attacks
–> 4G & 5G IMSI capturing - HackRead <–