| 2018-09-19 | When EL Injection meets Java Deserialization | re4lity | 2719 | |
| 2018-09-19 | Intercepting and Modifying responses with Chrome via the Devtools Protocol | re4lity | 2624 | |
| 2018-09-19 | A Tale of Two Bugs · Our Machinery | re4lity | 2001 | |
| 2018-09-19 | XSS Vulnerabilities in Multiple iFrame Busters Affecting Top Tier Sites | re4lity | 2424 | |
| 2018-09-19 | Peekaboo Critical Vulnerability in NUUO Network Video Recorder | re4lity | 1753 | |
| 2018-09-19 | Cheatsheet - Flask & Jinja2 SSTI | re4lity | 2955 | |
| 2018-09-19 | hack the box - web题解 | 梁小武 | 6488 | |
| 2018-09-19 | indictment-of-north-korean-regime-backed-programmer | tolive | 7617 | |
| 2018-09-19 | lynis插件编写:从入门到放弃 | 梁小武 | 5478 | |
| 2018-09-19 | 基于Redis未授权访问的挖矿蠕虫分析 | 冷漠 | 5130 | |
| 2018-09-19 | 碎碎念之Afl-fuzz Docker实践 | re4lity | 2032 | |
| 2018-09-19 | Windows Userland Persistence Fundamentals | tolive | 2406 | |
| 2018-09-19 | poking-around-with-2-lsass-protection-options | tolive | 2347 | |