| 2019-05-06 | write-after-free vulnerability in Firefox, Analysis and Exploitation | re4lity | 2037 | |
| 2019-05-06 | response: Monzo's real-time incident response and reporting tool | re4lity | 1447 | |
| 2019-05-06 | Throwing 500 vm’s at your fuzzing target being an individual security researcher | re4lity | 1600 | |
| 2019-05-06 | Comprehensive walkthrough of the LTDH19 RE challenges | re4lity | 1880 | |
| 2019-05-06 | Hack The Box - BigHead | re4lity | 2600 | |
| 2019-05-06 | Android Application Diffing: CVE-2019-10875 Inspection | re4lity | 6870 | |
| 2019-05-06 | Unpacking Redaman Malware & Basics of Self-Injection Packers | re4lity | 1639 | |
| 2019-05-06 | Tale of a Wormable Twitter XSS | re4lity | 1898 | |
| 2019-05-06 | From zero to tfp0 - Part 2: Walkthrough of the voucher_swap exploit | re4lity | 1885 | |
| 2019-05-06 | From Zero to tfp0 - Part 1: Prologue | re4lity | 1644 | |
| 2019-05-06 | Detailed Analysis of macOS Vulnerability CVE-2019-8507 | re4lity | 1658 | |
| 2019-05-06 | D-Link camera vulnerability allows attackers to tap into the video stream | re4lity | 6499 | |
| 2019-05-06 | Eight Devices, One Exploit | re4lity | 1841 | |