| 2014-10-30 | rdp replay | qiaoy | 10090 | |
| 2014-10-24 | 云端博弈——云安全入侵取证及思考 | 路人甲 | 3351 | |
| 2014-10-02 | 取证学习资料DVD | 路人甲 | 3024 | |
| 2014-09-29 | SU-CTF 2014 – Cryptography 100 – Huge key writeup | 路人甲 | 3072 | |
| 2014-09-09 | Analysis of Chinese MITM on Google | 路人甲 | 2486 | |
| 2014-08-26 | 21 Popular Digital Forensics Tools | 路人甲 | 3167 | |
| 2014-08-24 | Forensic Analysis of Windows Shellbags | 路人甲 | 3150 | |
| 2014-08-22 | Tracking Attackers: Honeypot, Part 1 (Honeyd) | 路人甲 | 2372 | |
| 2014-08-18 | Web Server Attack Investigation | 路人甲 | 3043 | |
| 2014-08-18 | Network Forensics Puzzle Contest 2014 Walkthrough | 路人甲 | 3546 | |
| 2014-08-10 | HoneyDrive 3:The Premier Honeypot Linux Distro | 路人甲 | 3190 | |
| 2014-08-05 | Rekall Memory Forensic Framework | 路人甲 | 3116 | |
| 2014-08-01 | Xplico:network forensics tool | 路人甲 | 3282 | |