| 2016-11-15 | How Can Drones Be Hacked? The updated list of vulnerable drones & attack tools | BaCde | 7724 | |
| 2016-11-15 | Pwning Your Java Messaging With Deserialization Vulnerabilities[PDF] | BaCde | 2109 | |
| 2016-11-15 | How To Set Up A Drone Vulnerability Testing Lab | BaCde | 7146 | |
| 2016-11-15 | 数据泄露信息发布网站 | BaCde | 3009 | |
| 2016-11-14 | iRET:IOS 逆向渗透测试工具套件 | re4lity | 2947 | |
| 2016-11-14 | 滥用NPM库实现敏感数据提取 | re4lity | 6606 | |
| 2016-11-14 | 使用Commix绕过安全防护利用命令执行漏洞 | re4lity | 2352 | |
| 2016-11-11 | SQLi, Privilage Escalation, and PowerShell Empire | BaCde | 2067 | |
| 2016-11-11 | Tplmap:一个自动化的服务端模板注射攻击检测和漏洞利用工具 | re4lity | 2959 | |
| 2016-11-11 | 利用 Python 代码实现 Web 应用的注入 | re4lity | 2586 | |
| 2016-11-11 | Cyber security geoip attack map that follows syslog and parses IPs/port numbers | BaCde | 2720 | |
| 2016-11-11 | Collective Intelligence Framework | BaCde | 3108 | |
| 2016-11-11 | PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tan | BaCde | 2607 | |