| 2018-04-24 | Debugging Windows Services For Malware Analysis / Reverse Engineering | re4lity | 2256 | |
| 2018-04-24 | Small mistakes lead to big problems | re4lity | 1918 | |
| 2018-04-24 | A bunch of Red Pills: VMware Escapes | re4lity | 2705 | |
| 2018-04-24 | Loading Kernel Shellcode | re4lity | 5141 | |
| 2018-04-24 | ShofEL2, a Tegra X1 and Nintendo Switch exploit | re4lity | 2380 | |
| 2018-04-24 | HackBox is the combination of awesome techniques. | re4lity | 2330 | |
| 2018-04-24 | picojs:A face detection library in 200 lines of JavaScript | re4lity | 5155 | |
| 2018-04-24 | Exploiting misconfigured CORS Null Origin | re4lity | 2286 | |
| 2018-04-24 | DOM Based Cross-Site Scripting in Google VRView library | re4lity | 2289 | |
| 2018-04-24 | Linkedin Autofill Vulnerability | re4lity | 2174 | |
| 2018-04-24 | JWT common pitfalls, attacks, and mitigations | re4lity | 1755 | |
| 2018-04-24 | HooToo TripMate Routers are Cute But Insecure | re4lity | 2542 | |
| 2018-04-24 | Go语言任意代码执行漏洞 CVE-2018-6574 | re4lity | 4196 | |