| 2019-05-06 | From zero to tfp0 - Part 2: Walkthrough of the voucher_swap exploit | re4lity | 1852 | |
| 2019-05-06 | Eight Devices, One Exploit | re4lity | 1813 | |
| 2019-04-26 | How to Predict Which Vulnerabilities Will Be Exploited | ourren | 3035 | |
| 2019-04-22 | ct-exposer: discovers sub-domains by searching Certificate Transparency logs | ourren | 1897 | |
| 2019-04-17 | Exposed: Cyberattacks on Cloud Honeypots | ourren | 3058 | |
| 2019-04-09 | Apache 本地提权漏洞 CVE-2019-0211 Exploit | mimblewimble | 9835 | |
| 2019-03-27 | One-liner Safari sandbox escape exploit | re4lity | 2568 | |
| 2019-03-22 | Java Serialization Objects (JSO): An Exploitation Guide | re4lity | 1689 | |
| 2019-03-22 | CVE-2019-5786 FileReader Exploit | re4lity | 1655 | |
| 2019-03-20 | Multiple Ways to Exploiting OSX using PowerShell Empire | re4lity | 1875 | |