| 2019-03-06 | houjingyi233/CPU-vulnerabiility-collections | re4lity | 2550 | |
| 2019-03-06 | Hijacking a Customer Account with a Crafted Image | re4lity | 1798 | |
| 2019-03-06 | Automate discovering and dropping payloads on LAN Raspberry Pi's via ssh | re4lity | 1930 | |
| 2019-03-06 | SirepRAT: Remote Command Execution as SYSTEM on Windows IoT Core | re4lity | 1912 | |
| 2019-03-06 | CVE-2018-8639-exp | re4lity | 6198 | |
| 2019-03-06 | Auditing GitHub Repo Wikis for Fun and Profit | re4lity | 2069 | |
| 2019-03-06 | Finding and exploiting CVE-2018–7445 | re4lity | 4319 | |
| 2019-03-06 | Detecting Malicious Behavior by Unmasking WebSockets | re4lity | 1635 | |
| 2019-03-06 | Don't worry about being locked with Loccess | re4lity | 1735 | |
| 2019-03-06 | Host Header Poisoning in IBM Websphere | re4lity | 2930 | |
| 2019-03-06 | Universal RCE with Ruby YAML.load | re4lity | 1727 | |
| 2019-03-06 | 美国政略统筹下的网军军事战略 | ourren | 1809 | |
| 2019-03-06 | 红队后渗透测试中的文件传输技巧 | ourren | 4245 | |