| 2016-08-11 | DECAF - Dynamic Executable Code Analysis Framework | Bincker | 2795 | |
| 2016-08-11 | David Brumley's Research | Bincker | 2291 | |
| 2016-08-11 | BitBlaze: Binary Analysis for Computer Security | Bincker | 3144 | |
| 2016-08-11 | symantec - Security Response Custom Report | Bincker | 2525 | |
| 2016-08-11 | The DEFCON CTF VM | Bincker | 2819 | |
| 2016-08-11 | Best DEF CON 24 Hacking Conference slides | Bincker | 1804 | |
| 2016-08-11 | toxic proxies bypassing https and vpns to pwn online identity | Bincker | 2393 | |
| 2016-08-11 | Pure Off-path TCP attack demo by using a side channel in Recent Linux Kernel | Bincker | 4075 | |
| 2016-08-11 | IRMA v1.3.0 released | Bincker | 2321 | |
| 2016-08-11 | Xen exploitation part 3: XSA-182, Qubes escape | Bincker | 2197 | |
| 2016-08-11 | Xen exploitation part 2: XSA-148, from guest to host | Bincker | 1864 | |
| 2016-08-11 | Xen exploitation part 1: XSA-105, from nobody to root | Bincker | 1884 | |
| 2016-08-10 | Return Oriented Exploitation (ROP) | Bincker | 2688 | |