| 2018-09-19 | indictment-of-north-korean-regime-backed-programmer | tolive | 7020 | |
| 2018-09-19 | Windows Userland Persistence Fundamentals | tolive | 2298 | |
| 2018-09-19 | poking-around-with-2-lsass-protection-options | tolive | 2213 | |
| 2018-09-12 | reversing-malware-in-a-custom-format-hidden-bee-elements | tolive | 2277 | |
| 2018-09-11 | msft-word-bug-bypass-security | tolive | 1780 | |
| 2018-09-11 | metasploit-adduser-analysis | tolive | 2682 | |
| 2018-09-11 | ctf-walkthrough-hacken-cup-2018 | tolive | 2196 | |
| 2018-09-06 | koadic-pen-testing-pivoting-javascripting-part-ii | tolive | 1856 | |
| 2018-09-06 | koadic-lol-malware-meets-python-based-command-and-control-c2-server-part-i | tolive | 1471 | |
| 2018-09-05 | what-is-it-that-makes-a-microsoft-executable | tolive | 1583 | |
| 2018-09-03 | HITB Gsec sg2018 | tolive | 1722 | |
| 2018-09-03 | Chainspotting! Building Exploit Chains with Logic Bugs | tolive | 4310 | |
| 2018-09-02 | Empowering red and blue teams with osint c0c0n 2017 | tolive | 1593 | |