| 2013-08-27 | Nymaim – obfuscation chronicles | 路人甲 | 2939 | |
| 2013-08-25 | WH反追踪支援平台的设计与优化 | 路人甲 | 2839 | |
| 2013-08-22 | Poison Ivy: Assessing Damage and Extracting Intelligence | 路人甲 | 3412 | |
| 2013-08-21 | PDF Attack: A Journey from the Exploit Kit to the Shellcode | 路人甲 | 2706 | |
| 2013-08-20 | Anti-decompiling techniques in malicious Java Applets | 路人甲 | 2715 | |
| 2013-08-19 | Wild Wild West – 08/2013 | 路人甲 | 2737 | |
| 2013-08-19 | PDF Attack: A Journey from the Exploit Kit to the Shellcode | 路人甲 | 2277 | |
| 2013-08-18 | Trustlook的安卓app分析报告 | 路人甲 | 3778 | |
| 2013-08-01 | ApkAnalyser:Powerful tool to analyse your APKs now released | 路人甲 | 4444 | |
| 2013-07-29 | 从 Windows 到 Android:威胁的持续迁移 | 路人甲 | 3917 | |
| 2013-07-25 | Automated Deobfuscation of Android Applications by Jurriaan Bremer | 路人甲 | 4285 | |
| 2013-07-24 | Malware Evasion Chart | 路人甲 | 4250 | |
| 2013-07-20 | Kore Exploit Kit | 路人甲 | 3109 | |