| 2014-06-08 | How To Defend Against Advanced IE Exploitation | 路人甲 | 2458 | |
| 2014-06-03 | CVE-2012-1889 exploit sample analysis | secniu | 7163 | |
| 2014-05-25 | Internet_Explorer_11_Exploit | 路人甲 | 2080 | |
| 2014-05-24 | Metasploit: Controlling Internet Explorer user traffic through a proxy PAC file | 路人甲 | 3326 | |
| 2014-05-24 | Android Hacking and Security, Part 6: Exploiting Debuggable Android Applications | 路人甲 | 2152 | |
| 2014-05-22 | Exploiting LFI Vulnerabilities with Liffy | 路人甲 | 2273 | |
| 2014-05-16 | Exploit Exercises:a variety of virtual machines | 路人甲 | 2101 | |
| 2014-05-14 | RIG Exploit Pack | 路人甲 | 3053 | |
| 2014-05-10 | [投稿]从CVE-2014-0166看高效率EXP的编写 | 路人甲 | 2961 | |
| 2014-05-10 | Exploit Kit Roundup: Best of Obfuscation Techniques | 路人甲 | 2219 | |