| 2020-04-21 | Exploiting (Almost) Every Antivirus Software | re4lity | 3517 | |
| 2020-04-21 | iOS acquisition methods compared: logical, full file system and iCloud | re4lity | 2190 | |
| 2020-04-21 | Grammar based fuzzing PDFs with Domato | re4lity | 3567 | |
| 2020-04-21 | CVE-2020-0791 | re4lity | 2062 | |
| 2020-04-21 | SMBGhost pre-auth RCE abusing Direct Memory Access structs | re4lity | 2495 | |
| 2020-04-21 | A HTTP PoC Endpoint for cve-2020-5260 | re4lity | 2117 | |
| 2020-04-21 | Android Kernel Exploitation | re4lity | 3498 | |
| 2020-04-21 | GHSL-2020-038: Use after free in Chrome WebAudio | re4lity | 1980 | |
| 2020-04-21 | Dissecting the Windows Defender Driver | re4lity | 3392 | |
| 2020-04-21 | awesome-virtualization: Collection of resources about Virtualization | re4lity | 1941 | |
| 2020-04-21 | SystemToken: Steal privileged token to obtain SYSTEM shell | re4lity | 1798 | |
| 2020-04-21 | Handbook of information collection for penetration testing and src | re4lity | 4064 | |
| 2020-04-21 | This challenge is Inon Shkedy's 31 days API Security Tips. | re4lity | 1961 | |