| 2019-05-06 | Unpacking Redaman Malware & Basics of Self-Injection Packers | re4lity | 1685 | |
| 2019-05-06 | Tale of a Wormable Twitter XSS | re4lity | 1951 | |
| 2019-05-06 | From zero to tfp0 - Part 2: Walkthrough of the voucher_swap exploit | re4lity | 1957 | |
| 2019-05-06 | From Zero to tfp0 - Part 1: Prologue | re4lity | 1731 | |
| 2019-05-06 | Detailed Analysis of macOS Vulnerability CVE-2019-8507 | re4lity | 1691 | |
| 2019-05-06 | D-Link camera vulnerability allows attackers to tap into the video stream | re4lity | 6832 | |
| 2019-05-06 | Eight Devices, One Exploit | re4lity | 1875 | |
| 2019-05-06 | EL3 Tour: Get the Ultimate Privilege of Android Phone | re4lity | 88356 | |
| 2019-05-06 | Vulmap: Vulmap Online Local Vulnerability Scanners Project | re4lity | 1545 | |
| 2019-05-06 | Bashter: Web Crawler, Scanner, and Analyzer Framework (Shell-Script based) | re4lity | 1801 | |