| 2015-02-02 | A sample of malware I analyzed | 路人甲 | 3085 |  | 
| 2015-01-30 | Static analysis of an unknown compression format | Bincker | 3499 |  | 
| 2015-01-30 | “暗云”BootKit木马详细技术分析 | 路人甲 | 3037 |  | 
| 2015-01-28 | Discovering and remediating an active but disused botnet | 路人甲 | 2641 |  | 
| 2015-01-28 | A Different Exploit Angle on Adobe's Recent Zero-Day | 路人甲 | 3386 |  | 
| 2015-01-23 | ProcDOT:a new way of visual malware analysis | 路人甲 | 3469 |  | 
| 2015-01-23 | Dynamic Malware Analysis with REMnux v5 – Part 1 | 路人甲 | 2753 |  | 
| 2015-01-22 | Scan office documents with OfficeMalScanner | Bincker | 2726 |  | 
| 2015-01-22 | PDF deconstruído al aroma de shellcode (III) | Bincker | 3094 |  | 
| 2015-01-22 | PDF deconstruído al aroma de shellcode ( II )- | Bincker | 1996 |  | 
| 2015-01-22 | Malware analysis with ... Gephi?  | Bincker | 2706 |  | 
| 2015-01-21 | 首次现身中国的CTB-Locker“比特币敲诈者”病毒分析 | redboy | 8784 |  | 
| 2015-01-19 | Analysis and Detection of Heap-based Malwares Using Introspection in a Virtualiz | Bincker | 3749 |  |