| 2015-12-14 | XSSPayloads-Execute-Cheatsheet | tolive | 2666 | |
| 2015-12-13 | sqlmaps-tamper-scripts的作用说明 | tolive | 3588 | |
| 2015-12-13 | Unboxing the White-Box Practical attacks against Obfuscated Ciphers | tolive | 2719 | |
| 2015-12-12 | Browser mitigations against memory corruption vulnerabilities | tolive | 2287 | |
| 2015-12-11 | adare2book | tolive | 2302 | |
| 2015-12-11 | making-an-antivirus-engine-the-guidelines | tolive | 2737 | |
| 2015-12-07 | The Swift Programming Language(source code) | tolive | 2990 | |
| 2015-12-03 | Acunetix WVS 10 - Local Privilege escalation | tolive | 2540 | |
| 2015-11-30 | Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS | tolive | 3852 | |
| 2015-11-28 | angularjs-expression-security-internals | tolive | 3385 | |
| 2015-11-27 | 3-attacks-on-cisco-tacacs-bypassing | tolive | 3055 | |
| 2015-11-26 | 信息安全之路--和好友共同学习[ie8t] | zhangysh1995 | 7327 | |
| 2015-11-24 | Markov Chains as a Keyed Obfuscation Method | tolive | 2337 | |