| 2015-10-13 | Code coverage using dynamic symbolic execution | ourren | 2900 | |
| 2015-10-10 | Fuzzing with american fuzzy lop [LWN.net] | Bincker | 2735 | |
| 2015-10-10 | Dynamic Analysis Of Adobe Flash Files | Bincker | 2207 | |
| 2015-10-10 | ROP Illmatic: Exploring Universal ROP on glibc x86-64 (en) | Bincker | 3726 | |
| 2015-10-08 | Cisco Web VPNs Leveraged for Access and Persistence | ourren | 2735 | |
| 2015-09-29 | Revisiting Apple IPC: (1) Distributed Objects | 路人甲 | 3036 | |
| 2015-09-29 | Abusing GDI for ring0 exploit primitives | 路人甲 | 2608 | |
| 2015-09-28 | IoSpy and IoAttack | 路人甲 | 5680 | |
| 2015-09-27 | FCatalog: Find similarities between binary functions | ourren | 2880 | |
| 2015-09-27 | CVE-2015-2546:从补丁比对到Exploit | ourren | 4123 | |
| 2015-09-25 | CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough | ourren | 3546 | |
| 2015-09-23 | A list of IDA Plugins | ourren | 3051 | |
| 2015-09-19 | Exploit开发系列教程-Windows基础&shellcode | 路人甲 | 2728 | |