| 2016-08-11 | [Defcon24] Introduction to the Witchcraft Compiler Collection | Bincker | 2620 | |
| 2016-08-11 | Cracking HawkEye Keylogger Reborn | Bincker | 3347 | |
| 2016-08-11 | How I Cracked a Keylogger and Ended Up in Someone's Inbox | Bincker | 2420 | |
| 2016-08-11 | Triton under the hood | Bincker | 2482 | |
| 2016-08-11 | IRMA v1.3.0 released | Bincker | 2258 | |
| 2016-08-11 | Keyringer: encrypted and distributed secret sharing software | Bincker | 2041 | |
| 2016-08-11 | Reversing a Finite Field Multiplication Optimization | Bincker | 3006 | |
| 2016-08-11 | Implementing a Custom Directive Handler in Clang | Bincker | 2646 | |
| 2016-08-11 | Binmap: a system scanner | Bincker | 2668 | |
| 2016-08-11 | SCAF - source-code-analysis-framework | Bincker | 2694 | |
| 2016-08-11 | A brief survey of Fully Homomorphic Encryption, computing on encrypted data | Bincker | 2367 | |
| 2016-08-11 | Xen exploitation part 3: XSA-182, Qubes escape | Bincker | 2179 | |
| 2016-08-11 | Xen exploitation part 2: XSA-148, from guest to host | Bincker | 1851 | |