| 2017-10-22 | Broken Link Hijacking - How expired links can be exploited. | re4lity | 7479 | |
| 2017-10-22 | subjack: Hostile Subdomain Takeover tool written in Go | re4lity | 3834 | |
| 2017-10-22 | MIDA-Multitool: 脚本集合(系统枚举,漏洞验证,权限提升) | re4lity | 3324 | |
| 2017-10-22 | The Stony Path of Android | re4lity | 2670 | |
| 2017-10-22 | OSINTforPenTests 渗透者的开源情报搜集 | re4lity | 3396 | |
| 2017-10-22 | How i found an SSRF in Yahoo! Guesthouse (Recon Wins) | re4lity | 3362 | |
| 2017-10-22 | 利用Mimikatz和Powersploit导出证书与绕过杀毒软件 | re4lity | 5669 | |
| 2017-10-21 | awesome-yara: A curated list of awesome YARA rules, tools, and people | re4lity | 4081 | |
| 2017-10-20 | Mysql约束攻击 | ch1st | 7475 | |
| 2017-10-19 | Browser security beyond sandboxing | BaCde | 2704 | |
| 2017-10-19 | The Cyber Vault Project | National Security Archive | BaCde | 3119 | |
| 2017-10-19 | Typical bank trojan reversed (detailed) [PDF] | BaCde | 3176 | |
| 2017-10-18 | Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II | BaCde | 2994 | |