| 2012-07-30 | New Perspectives in Code Obfuscation and Watermarking | 路人甲 | 2609 | |
| 2012-07-30 | Hotpatching and Inline Function Hooking Explained | 路人甲 | 3733 | |
| 2012-07-30 | Rovnix.D: the code injection story | 路人甲 | 3257 | |
| 2012-07-30 | Deep Reflection - Defining Structs and Enums in PowerShell | 路人甲 | 2914 | |
| 2012-07-30 | My BlueHat Prize Entry: CounterHeapSpray | 路人甲 | 2835 | |
| 2012-07-30 | A Closer Look at WordPress Password Hashes | 路人甲 | 2460 | |
| 2012-07-30 | Ambush HIPS: A Behavior-Based Host IPS | 路人甲 | 2179 | |
| 2012-07-28 | Slides:Exploring the NFC Attack Surface | 路人甲 | 2719 | |
| 2012-07-28 | WP:Exploring the NFC Attack Surface | 路人甲 | 3588 | |
| 2012-07-27 | XSS ChEF:Chrome extension exploitation framework | 路人甲 | 3015 | |
| 2012-07-27 | ASEF:Android Security Evaluation Framework | 路人甲 | 3041 | |
| 2012-07-27 | Cuckoo Sandbox:malware analysis system | 路人甲 | 2895 | |
| 2012-07-26 | DDoS tool: LOIC | 路人甲 | 2941 | |