| 2019-08-13 | How to Build Your Own Penetration Testing Dropbox Using a Raspberry Pi 4 | re4lity | 1189 | |
| 2019-08-13 | solr-injection: Apache Solr Injection Research | re4lity | 3184 | |
| 2019-08-13 | SELECT code_execution FROM * USING SQLite; | re4lity | 2757 | |
| 2019-08-13 | Subdomain takeover - Chapter two: Azure Services | re4lity | 4322 | |
| 2019-08-13 | Reversing an Oppo ozip encryption key from encrypted firmware | re4lity | 2544 | |
| 2019-08-13 | Privilege Escalation in Cloud Foundry UAA | re4lity | 1586 | |
| 2019-08-13 | Exploiting Out Of Band XXE using internal network and php wrappers | re4lity | 1406 | |
| 2019-08-13 | JNDI Injection using Getter Based Deserialization Gadgets | re4lity | 1312 | |
| 2019-08-13 | How To Attack Kerberos 101 | re4lity | 1580 | |
| 2019-08-13 | AggressorScript-UploadAndRunFrp | ch1ng | 5246 | |
| 2019-08-10 | Case study: Searching for a vulnerability pattern in the Linux kernel | re4lity | 2189 | |
| 2019-08-10 | AggressorScript-CreateCloneHiddenAccount | ch1ng | 6223 | |
| 2019-08-09 | 一次美丽的误会引发对函数调用保护的思考 | anhkgg | 1530 | |