| 2013-08-19 | PDF Attack: A Journey from the Exploit Kit to the Shellcode | 路人甲 | 2260 | |
| 2013-08-18 | djb research: Automatic Exploit Generation | 路人甲 | 3231 | |
| 2013-08-18 | New Native Java Exploit Method Using Statement Object Analysis | 路人甲 | 2916 | |
| 2013-07-24 | Advanced Exploitation of Windows Kernel Privilege Escalation | 路人甲 | 3188 | |
| 2013-07-20 | Kore Exploit Kit | 路人甲 | 3094 | |
| 2013-07-20 | Local root exploits | 路人甲 | 2742 | |
| 2013-07-14 | New Zero-Day Attack Copies Earlier Flash Exploitation | 路人甲 | 3221 | |
| 2013-07-02 | Shodan Exploits:又一个漏洞搜索引擎 | 路人甲 | 3483 | |
| 2013-06-28 | Heap Overflow: Vulnerability and Heap Internals Explained | 路人甲 | 3570 | |
| 2013-06-28 | Styx Exploit Kit Takes Advantage of Vulnerabilities | 路人甲 | 2567 | |