| 2012-11-22 | An Attempt to Make a Read Access Violation Exploitable | 路人甲 | 3126 | |
| 2012-11-22 | Windows Kernel Font Fuzzing and Exploitation | 路人甲 | 2947 | |
| 2012-11-21 | 漏洞挖掘手记之mona简介 | 路人甲 | 3356 | |
| 2012-11-17 | BTrace:dynamic tracing tool for the Java platform | 路人甲 | 2784 | |
| 2012-11-16 | Vulnerability Analysis and Practical Data Flow Analysis Visualizationfinaledit | 路人甲 | 3490 | |
| 2012-11-15 | TrueCrypt破解工具-TCHead | 路人甲 | 2982 | |
| 2012-11-12 | What is a Zero-day Vulnerability | 路人甲 | 2970 | |
| 2012-11-01 | Heap Exploitation Abstraction by Example — OWASP AppSec Research 2012 | 路人甲 | 3207 | |
| 2012-10-26 | need more attention exploit-db adobe reader crash 0day recently | 路人甲 | 3382 | |
| 2012-10-26 | Introducing the USB Stick of Death | 路人甲 | 2715 | |
| 2012-10-25 | How to-catch-a-chameleon-steven seeley-ruxco | 路人甲 | 3030 | |
| 2012-10-21 | CVE-2012-1535 Adobe Flash Player Integer Overflow Vulnerability Analysis | 路人甲 | 2882 | |
| 2012-10-21 | the ultimate security vulnerability data source | 路人甲 | 2281 | |