| 2020-07-02 | Android App Source code Extraction and Bypassing Root and SSL Pinning checks | re4lity | 3129 |  | 
| 2020-07-02 | leonidas: Automated Attack Simulation in the Cloud | re4lity | 2454 |  | 
| 2020-07-02 | Exploiting an Envoy heap vulnerability | re4lity | 1939 |  | 
| 2020-07-02 | Hunting for anomalous sessions in your data with Azure Sentinel | re4lity | 1431 |  | 
| 2020-07-02 | Some DOS bugs while processing Microsoft LNK files | re4lity | 1672 |  | 
| 2020-07-02 | ZombieVPN, Breaking That Internet Security | re4lity | 3822 |  | 
| 2020-07-02 | Breaking Windows KASLR by Leaking KVA Shadow Mappings | re4lity | 1863 |  | 
| 2020-07-02 | TuxGuitar - stealing local files (XXE) | re4lity | 1477 |  | 
| 2020-07-01 | 子域名监控式漏洞扫描 | misaki | 4467 |  | 
| 2020-06-28 | APT的思考: PowerShell命令混淆高级对抗 | qiye | 6628 |  | 
| 2020-06-28 | Recovering Credentials from a Process inside a Docker Container | re4lity | 1927 |  | 
| 2020-06-28 | Java Deserialization Exploitation With Customized Ysoserial Payloads | re4lity | 1642 |  | 
| 2020-06-28 | Using SQL Injection to perform SSRF/XSPA attacks | re4lity | 1603 |  |