| 2014-05-22 | Thotcon 0×5 Phishing Frenzy | 路人甲 | 2296 | |
| 2014-05-22 | BinTrace record and dump traces of an executable program | 路人甲 | 3397 | |
| 2014-05-22 | MemPick: High-Level Data Structure Detection in C/C++ Binaries | 路人甲 | 3494 | |
| 2014-05-22 | Exploiting LFI Vulnerabilities with Liffy | 路人甲 | 2281 | |
| 2014-05-22 | The PLA and the 8:00am-5:00pm Work Day | 路人甲 | 2201 | |
| 2014-05-22 | How I bypassed 2-Factor-Authentication on Google, Facebook, Yahoo, LinkedIn | 路人甲 | 2718 | |
| 2014-05-22 | Baby's first NX+ASLR bypass | 路人甲 | 2520 | |
| 2014-05-22 | DEFCON 22 CTF Qualifiers Writeup | 路人甲 | 2720 | |
| 2014-05-22 | Linux x86 Reverse Engineering | 路人甲 | 2758 | |
| 2014-05-22 | 批量网站DNS区域传送漏洞检测 | 路人甲 | 2678 | |
| 2014-05-22 | Mysql漏洞利用 | 路人甲 | 2553 | |
| 2014-05-21 | Chrome扩展及应用开发 | 路人甲 | 2816 | |
| 2014-05-20 | Mathematics for Computer Science,Eric Lehman et al 2013 | 路人甲 | 3289 | |