| 2013-02-21 | Digging Into the Sandbox-Escape Technique of the Recent PDF Exploit | 路人甲 | 3532 | |
| 2013-02-15 | From USR to SVC: Dissecting the 'evasi0n' Kernel Exploit | 路人甲 | 3373 | |
| 2013-02-03 | Exploiting_Adobe_Flash_zh | 路人甲 | 3195 | |
| 2013-02-01 | Post Exploitation:进阶渗透 | 路人甲 | 2660 | |
| 2013-01-25 | PHP data include exploit | 路人甲 | 2548 | |
| 2013-01-21 | How To Become an Infosec Expert, Part I | 路人甲 | 2315 | |
| 2013-01-18 | Red October - Java Exploit Delivery Vector Analysis | 路人甲 | 2740 | |
| 2013-01-11 | Red Kit an Emerging Exploit Pack | 路人甲 | 3492 | |
| 2013-01-11 | Exploring The Top Mobile Software Security Vulnerabilities: #1 Insecur | 路人甲 | 2403 | |
| 2013-01-10 | Proof-of-Concept exploit for Rails SQL Injection | 路人甲 | 2207 | |