| 2018-03-28 | The phenomenon of smart contract honeypots | re4lity | 3320 | |
| 2018-03-28 | How BloodHound's Session Collection Works | re4lity | 1252 | |
| 2018-03-28 | Quickpost: Using Suricata on Windows | re4lity | 2150 | |
| 2018-03-28 | Go-deliver is a payload delivery tool coded in Go. | re4lity | 1334 | |
| 2018-03-28 | Tools to gather subdomains from Bug Bounty programs | re4lity | 2023 | |
| 2018-03-28 | Cowrie Honeypot Analysis | re4lity | 5855 | |
| 2018-03-27 | Signature Based Detection of User Events for PostMortem Forensic Analysis | tolive | 1819 | |
| 2018-03-27 | 记一次爬虫批量爬取exp | nmask | 2770 | |
| 2018-03-26 | basics-of-tracking-wmi-activity | tolive | 2375 | |
| 2018-03-26 | Python is the best language-Writeup | ph0en1xer | 2540 | |
| 2018-03-26 | following the trace of WMI Backdoors & other nastiness | tolive | 2936 | |
| 2018-03-26 | uefi-ninja | tolive | 2637 | |
| 2018-03-26 | SecWiki周刊(第212期) | 504 | 2180 | |