| 2018-08-23 | rapid7 threat report 2018-q2 | ourren | 1906 | |
| 2018-08-20 | reversing-and-patching-net-binaries-with-embedded-references | tolive | 1408 | |
| 2018-08-20 | arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe | tolive | 2103 | |
| 2018-08-15 | deep-hooks-monitoring-native-execution-wow64-applications-part-3 | tolive | 2299 | |
| 2018-08-15 | deep-hooks-monitoring-native-execution-wow64-applications-part-2 | tolive | 2547 | |
| 2018-08-15 | deep-hooks-monitoring-native-execution-wow64-applications-part-1 | tolive | 1844 | |
| 2018-08-13 | X-Ways Forensics/ WinHex(手册) | tolive | 2146 | |
| 2018-08-06 | windows-rdp-related-event-logs-identification-tracking-and-investigation/ | tolive | 2604 | |
| 2018-08-06 | all-about-linux-swap-space | tolive | 2109 | |
| 2018-08-02 | Quick, how do I find all user accounts on a Windows PC and their login count | tolive | 2079 | |
| 2018-07-29 | beyond-good-ol-run-key-part-82 | tolive | 1599 | |
| 2018-07-28 | x86_64逆向工程简介 | lzhtony | 4772 | |
| 2018-07-27 | Oracle Privilege Escalation via Deserialization | tolive | 6341 | |