| 2017-10-22 | 利用Mimikatz和Powersploit导出证书与绕过杀毒软件 | re4lity | 5426 | |
| 2017-10-22 | XSS常见Paylaod分析-1 | pez1420 | 9775 | |
| 2017-10-21 | awesome-yara: A curated list of awesome YARA rules, tools, and people | re4lity | 4013 | |
| 2017-10-21 | wpa2 poc | tom0li | 7908 | |
| 2017-10-20 | Mysql约束攻击 | ch1st | 7191 | |
| 2017-10-20 | 用Sysmon进行威胁狩猎:发现具有宏的Word文档 | 嘶吼 | 3254 | |
| 2017-10-19 | 如何用一种最简单的方式分析恶意软件 | 嘶吼 | 2515 | |
| 2017-10-19 | Browser security beyond sandboxing | BaCde | 2678 | |
| 2017-10-19 | The Cyber Vault Project | National Security Archive | BaCde | 3026 | |
| 2017-10-19 | Typical bank trojan reversed (detailed) [PDF] | BaCde | 3108 | |
| 2017-10-18 | Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II | BaCde | 2945 | |
| 2017-10-18 | Hacking Bluetooth Smart Locks - workshop | BaCde | 2554 | |
| 2017-10-18 | SQLMAP Tamper Scripts for The Win | BaCde | 4066 | |