| 2019-01-30 | Abusing S4U2Self: Another Sneaky Active Directory Persistence | mimblewimble | 1801 | |
| 2019-01-30 | voucher_swap: Exploiting MIG reference counting in iOS 12 | mimblewimble | 2842 | |
| 2019-01-30 | Complex Drupal POP Chain | mimblewimble | 2216 | |
| 2019-01-29 | Defeating Flask’s Session Management | mimblewimble | 7129 | |
| 2019-01-29 | JWT Attack Walk-Through | mimblewimble | 8905 | |
| 2019-01-29 | UAC Bypass via SystemPropertiesAdvanced.exe and DLL Hijacking | mimblewimble | 4339 | |
| 2019-01-29 | how-to-argue-like-cobalt-strike | tolive | 2793 | |
| 2019-01-29 | 企业安全建设之HIDS | IceRainow | 4266 | |
| 2019-01-29 | malware-analysis/analyzing-darkhydrus-2-0 | tolive | 1890 | |
| 2019-01-27 | 信息收集总结 | Jokong | 4369 | |
| 2019-01-22 | analysis-exposure-change-assets-iot-2018 | tolive | 1557 | |
| 2019-01-22 | black-energy-analysis | tolive | 1585 | |
| 2019-01-22 | Check Point Forensic Files: GandCrab Returns with Friends (Trojans) | tolive | 1930 | |