| 2014-06-08 | How To Defend Against Advanced IE Exploitation | 路人甲 | 2452 | |
| 2014-06-03 | CVE-2012-1889 exploit sample analysis | secniu | 6941 | |
| 2014-05-25 | Internet_Explorer_11_Exploit | 路人甲 | 2068 | |
| 2014-05-24 | Metasploit: Controlling Internet Explorer user traffic through a proxy PAC file | 路人甲 | 3297 | |
| 2014-05-24 | Android Hacking and Security, Part 6: Exploiting Debuggable Android Applications | 路人甲 | 2143 | |
| 2014-05-22 | Exploiting LFI Vulnerabilities with Liffy | 路人甲 | 2252 | |
| 2014-05-16 | Exploit Exercises:a variety of virtual machines | 路人甲 | 2086 | |
| 2014-05-14 | RIG Exploit Pack | 路人甲 | 3044 | |
| 2014-05-10 | [投稿]从CVE-2014-0166看高效率EXP的编写 | 路人甲 | 2942 | |
| 2014-05-10 | Exploit Kit Roundup: Best of Obfuscation Techniques | 路人甲 | 2204 | |