| 2019-01-30 | Exploiting SystemD JournalD Part 1 | mimblewimble | 2181 | |
| 2019-01-30 | Abusing S4U2Self: Another Sneaky Active Directory Persistence | mimblewimble | 1814 | |
| 2019-01-30 | voucher_swap: Exploiting MIG reference counting in iOS 12 | mimblewimble | 2873 | |
| 2019-01-30 | Complex Drupal POP Chain | mimblewimble | 2277 | |
| 2019-01-29 | Defeating Flask’s Session Management | mimblewimble | 7333 | |
| 2019-01-29 | JWT Attack Walk-Through | mimblewimble | 9169 | |
| 2019-01-29 | UAC Bypass via SystemPropertiesAdvanced.exe and DLL Hijacking | mimblewimble | 4446 | |
| 2019-01-29 | how-to-argue-like-cobalt-strike | tolive | 2856 | |
| 2019-01-29 | 企业安全建设之HIDS | IceRainow | 4377 | |
| 2019-01-29 | malware-analysis/analyzing-darkhydrus-2-0 | tolive | 1897 | |
| 2019-01-27 | 信息收集总结 | Jokong | 4458 | |
| 2019-01-22 | analysis-exposure-change-assets-iot-2018 | tolive | 1563 | |
| 2019-01-22 | black-energy-analysis | tolive | 1598 | |