| 2013-02-21 | Digging Into the Sandbox-Escape Technique of the Recent PDF Exploit | 路人甲 | 3512 | |
| 2013-02-15 | From USR to SVC: Dissecting the 'evasi0n' Kernel Exploit | 路人甲 | 3362 | |
| 2013-02-03 | Exploiting_Adobe_Flash_zh | 路人甲 | 3170 | |
| 2013-02-01 | Post Exploitation:进阶渗透 | 路人甲 | 2640 | |
| 2013-01-25 | PHP data include exploit | 路人甲 | 2513 | |
| 2013-01-21 | How To Become an Infosec Expert, Part I | 路人甲 | 2284 | |
| 2013-01-18 | Red October - Java Exploit Delivery Vector Analysis | 路人甲 | 2733 | |
| 2013-01-11 | Red Kit an Emerging Exploit Pack | 路人甲 | 3460 | |
| 2013-01-11 | Exploring The Top Mobile Software Security Vulnerabilities: #1 Insecur | 路人甲 | 2351 | |
| 2013-01-10 | Proof-of-Concept exploit for Rails SQL Injection | 路人甲 | 2193 | |