| 2017-10-22 | Broken Link Hijacking - How expired links can be exploited. | re4lity | 7511 | |
| 2017-10-22 | subjack: Hostile Subdomain Takeover tool written in Go | re4lity | 3839 | |
| 2017-10-22 | MIDA-Multitool: 脚本集合(系统枚举,漏洞验证,权限提升) | re4lity | 3325 | |
| 2017-10-22 | The Stony Path of Android | re4lity | 2682 | |
| 2017-10-22 | OSINTforPenTests 渗透者的开源情报搜集 | re4lity | 3402 | |
| 2017-10-22 | How i found an SSRF in Yahoo! Guesthouse (Recon Wins) | re4lity | 3377 | |
| 2017-10-22 | 利用Mimikatz和Powersploit导出证书与绕过杀毒软件 | re4lity | 5682 | |
| 2017-10-22 | XSS常见Paylaod分析-1 | pez1420 | 10361 | |
| 2017-10-21 | awesome-yara: A curated list of awesome YARA rules, tools, and people | re4lity | 4081 | |
| 2017-10-21 | wpa2 poc | tom0li | 8326 | |
| 2017-10-20 | Mysql约束攻击 | ch1st | 7489 | |
| 2017-10-20 | 用Sysmon进行威胁狩猎:发现具有宏的Word文档 | 嘶吼 | 3350 | |
| 2017-10-19 | 如何用一种最简单的方式分析恶意软件 | 嘶吼 | 2573 | |