| 2019-03-06 | houjingyi233/CPU-vulnerabiility-collections | re4lity | 2485 | |
| 2019-03-06 | Hijacking a Customer Account with a Crafted Image | re4lity | 1740 | |
| 2019-03-06 | Automate discovering and dropping payloads on LAN Raspberry Pi's via ssh | re4lity | 1859 | |
| 2019-03-06 | SirepRAT: Remote Command Execution as SYSTEM on Windows IoT Core | re4lity | 1858 | |
| 2019-03-06 | CVE-2018-8639-exp | re4lity | 6102 | |
| 2019-03-06 | Auditing GitHub Repo Wikis for Fun and Profit | re4lity | 2002 | |
| 2019-03-06 | Finding and exploiting CVE-2018–7445 | re4lity | 4250 | |
| 2019-03-06 | Detecting Malicious Behavior by Unmasking WebSockets | re4lity | 1611 | |
| 2019-03-06 | Don't worry about being locked with Loccess | re4lity | 1691 | |
| 2019-03-06 | Host Header Poisoning in IBM Websphere | re4lity | 2890 | |
| 2019-03-06 | Universal RCE with Ruby YAML.load | re4lity | 1681 | |
| 2019-03-06 | 美国政略统筹下的网军军事战略 | ourren | 1765 | |
| 2019-03-06 | 红队后渗透测试中的文件传输技巧 | ourren | 4083 | |