| 2015-12-10 | TensorFlow tutorials and code examples for beginners | ourren | 2319 | |
| 2015-12-10 | 利用Chakra JIT绕过DEP和CFG | ourren | 2276 | |
| 2015-12-10 | Tutorial: How to reverse unknown protocols using Netzob | ourren | 3595 | |
| 2015-12-10 | Seven Years of a South American Threat Actor | ourren | 1878 | |
| 2015-12-08 | ZeroNights Conference materials | ourren | 3361 | |
| 2015-12-08 | MASSCAN Web Interface | ourren | 4246 | |
| 2015-12-08 | Best Practices: Indicator Rating and Confidence | ourren | 3059 | |
| 2015-12-08 | Malware Sakula - Evolutions v2.x-3.x (Part 2) | ourren | 2182 | |
| 2015-12-07 | 0day DLL Hijacking vulnerabilities in Microsoft Office | MD | 3293 | |
| 2015-12-07 | 偶遇BASH攻击,险入僵尸网络 | hblf | 8778 | |
| 2015-12-07 | Data Exfiltration via Blind OS Command Injection | ourren | 2109 | |
| 2015-12-07 | The Swift Programming Language(source code) | tolive | 2984 | |
| 2015-12-07 | JBoss JMXInvokerServlet 漏洞批量检测 | ourren | 8620 | |