| 2015-05-12 | Angler exploit kit using tricks to avoid referrer chain | MD | 2942 | |
| 2015-05-12 | 60 Days of Watching Hackers Attack Elasticsearch | MD | 2881 | |
| 2015-05-12 | Detecting Network Traffic from Metasploit’s Meterpreter | ourren | 2268 | |
| 2015-05-12 | Hardware-accelerated disk encryption in Android 5.1 | 路人甲 | 3205 | |
| 2015-05-12 | 大型网站的 HTTPS 实践 | 路人甲 | 2139 | |
| 2015-05-12 | 歌曲推荐系统实践:Pandas、SciPy和D3.js | 路人甲 | 2753 | |
| 2015-05-12 | Wordpress 评论功能XSS始末 | 路人甲 | 2759 | |
| 2015-05-12 | 针对以色列和巴勒斯坦的apt式攻击 | 路人甲 | 2689 | |
| 2015-05-11 | NumPy Cookbook | 路人甲 | 2875 | |
| 2015-05-11 | 数据挖掘十大算法总结--核心思想,算法优缺点,应用领域 | 路人甲 | 2623 | |
| 2015-05-11 | 高效运维最佳实践 | 路人甲 | 2246 | |
| 2015-05-11 | 2015 International Symposium on Software Testing and Analysis | 路人甲 | 3018 | |
| 2015-05-11 | An Inside Look at the Changing Threat Landscape of 2015 | ourren | 2743 | |