| 2014-04-30 | Best Paper Awards in Computer Science (since 1996) | 路人甲 | 2801 | |
| 2014-04-30 | Revisiting Mac OS X Kernel Rootkits | 路人甲 | 2758 | |
| 2014-04-30 | 那些年,那些 Apache Struts2 的漏洞 | 路人甲 | 2224 | |
| 2014-04-30 | 小米自动化运维实践 qcon 2014 Beijing | 路人甲 | 2301 | |
| 2014-04-30 | Identifying Malware Traffic with Bro and (CIF) | 路人甲 | 3061 | |
| 2014-04-30 | 基于AngularJS的企业软件前端架构 | 路人甲 | 2509 | |
| 2014-04-30 | 可能被绕过的防御有什么用 | 路人甲 | 2567 | |
| 2014-04-30 | zabbix企业应用之服务器硬件信息监控 | 路人甲 | 2607 | |
| 2014-04-30 | Reverse Engineering for Beginners book | Debug0 | 7683 | |
| 2014-04-30 | Attack of the Week: Triple Handshakes (3Shake) | 路人甲 | 2625 | |
| 2014-04-30 | BYPASSING ADVANCED THREAT DETECTION SYSTEMS | secniu | 7010 | |
| 2014-04-29 | 逆向基础(一) | WooYun知识库 | 墨阳 | 9767 | |
| 2014-04-28 | Out Of Control: Overcoming Control-Flow Integrity | 路人甲 | 5451 | |