| 2015-10-08 | Cisco Web VPNs Leveraged for Access and Persistence | ourren | 2787 | |
| 2015-09-29 | Revisiting Apple IPC: (1) Distributed Objects | 路人甲 | 3060 | |
| 2015-09-29 | Abusing GDI for ring0 exploit primitives | 路人甲 | 2616 | |
| 2015-09-28 | IoSpy and IoAttack | 路人甲 | 5689 | |
| 2015-09-27 | FCatalog: Find similarities between binary functions | ourren | 2889 | |
| 2015-09-27 | CVE-2015-2546:从补丁比对到Exploit | ourren | 4190 | |
| 2015-09-25 | CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough | ourren | 3561 | |
| 2015-09-23 | A list of IDA Plugins | ourren | 3062 | |
| 2015-09-19 | Exploit开发系列教程-Windows基础&shellcode | 路人甲 | 2737 | |
| 2015-09-19 | 利用BitmapData对象对抗Flash Player的隔离堆 | 路人甲 | 2885 | |
| 2015-09-17 | Readactor-Practical Code Randomization Resilient to Memory Disclosure | 路人甲 | 2793 | |
| 2015-09-16 | Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part III – Ul | MD | 2323 | |
| 2015-09-16 | DbgKit: first GUI extension for Debugging Tools for Windows | 路人甲 | 2241 | |