| 2017-10-25 | DNS错误响应的案例 | re4lity | 2307 | |
| 2017-10-25 | Stage-RemoteDll.ps1:32位和64位架构上的各种DLL注入技术 | re4lity | 3069 | |
| 2017-10-22 | nsearch: minimal script to help find script into the nse database | re4lity | 2944 | |
| 2017-10-22 | Blazy: a modern login brute forcer, CSRF, Clickjacking, Cloudflare and WAF | re4lity | 3534 | |
| 2017-10-22 | open-redirect-scanner: open redirect subdomains scanner | re4lity | 2874 | |
| 2017-10-22 | Wiping Out CSRF – Joe Rozner – Medium | re4lity | 3078 | |
| 2017-10-22 | Broken Link Hijacking - How expired links can be exploited. | re4lity | 7283 | |
| 2017-10-22 | subjack: Hostile Subdomain Takeover tool written in Go | re4lity | 3812 | |
| 2017-10-22 | MIDA-Multitool: 脚本集合(系统枚举,漏洞验证,权限提升) | re4lity | 3307 | |
| 2017-10-22 | The Stony Path of Android | re4lity | 2619 | |
| 2017-10-22 | OSINTforPenTests 渗透者的开源情报搜集 | re4lity | 3385 | |
| 2017-10-22 | How i found an SSRF in Yahoo! Guesthouse (Recon Wins) | re4lity | 3286 | |
| 2017-10-22 | 利用Mimikatz和Powersploit导出证书与绕过杀毒软件 | re4lity | 5559 | |