| 2019-08-14 | Monitoring the State of Internet Routing Security | re4lity | 2238 | |
| 2019-08-14 | Intercepting traffic from Android Flutter applications | re4lity | 2885 | |
| 2019-08-14 | Mautic Remote Code Execution | re4lity | 3502 | |
| 2019-08-13 | Three (And A Half) Vulns For The Price of One! | re4lity | 1976 | |
| 2019-08-13 | Debugging Cordova Applications | re4lity | 3708 | |
| 2019-08-13 | Meteor Blind NoSQL Injection | re4lity | 1175 | |
| 2019-08-13 | Building a custom malware sandbox with PANDA | re4lity | 3743 | |
| 2019-08-13 | Responding to Firefox 0-days in the wild | re4lity | 1899 | |
| 2019-08-13 | How to Build Your Own Penetration Testing Dropbox Using a Raspberry Pi 4 | re4lity | 1209 | |
| 2019-08-13 | solr-injection: Apache Solr Injection Research | re4lity | 3313 | |
| 2019-08-13 | SELECT code_execution FROM * USING SQLite; | re4lity | 2830 | |
| 2019-08-13 | Subdomain takeover - Chapter two: Azure Services | re4lity | 4646 | |
| 2019-08-13 | Reversing an Oppo ozip encryption key from encrypted firmware | re4lity | 2609 | |