| 2012-11-24 | Introduction to Exploitation | 路人甲 | 2978 | |
| 2012-11-23 | PHP string序列化与反序列化语法解析不一致带来的安全隐患 | 路人甲 | 2577 | |
| 2012-11-23 | Struts2多个漏洞简要分析 | 路人甲 | 3161 | |
| 2012-11-23 | routerpwn | 路人甲 | 4231 | |
| 2012-11-23 | The Future of Automated Malware Generation | 路人甲 | 2778 | |
| 2012-11-23 | Win32/Flamer: Reverse Engineering and Framework Reconstruction | 路人甲 | 2975 | |
| 2012-11-23 | rp++:find ROP sequences in PE/Elf/Mach-O x86/x64 binaries | 路人甲 | 3731 | |
| 2012-11-23 | Router Exploitation | 路人甲 | 3915 | |
| 2012-11-22 | Automated Malware Analysis & Deobfuscation | 路人甲 | 2679 | |
| 2012-11-22 | An Attempt to Make a Read Access Violation Exploitable | 路人甲 | 3099 | |
| 2012-11-22 | Windows Kernel Font Fuzzing and Exploitation | 路人甲 | 2945 | |
| 2012-11-22 | Password Algorithms: Google Chrome | 路人甲 | 2725 | |
| 2012-11-22 | 网站网页文件防篡改助手 | 路人甲 | 2560 | |