| -::DATE |
-::DESCRIPTION |
-::HITS |
|
|
|
|
-::AUTHOR |
| 2009-07-16 | [albanian] SQL Injection | 5535 | | | D | | boom3rang |
| 2009-07-14 | [german] Sicherheit von Webservern | 3339 | | | D | | kuze |
| 2009-07-14 | One Click Ownage | 8673 | | | D | | Ferruh Mavituna |
| 2009-07-10 | The Art of Grey-Box Attack | 9536 | | | D | | CWH Underground |
| 2009-07-02 | [french] Petite Explication Du SQL INJECTION | 6915 | | | D | | Moudi |
| 2009-06-30 | [romanian] Vulnerabilitati Web si securizarea acestora v1.0 | 2770 | | | D | | Nytro |
| 2009-06-30 | Cracking The Air, The Other Way | 8070 | | | D | | HitThemHard |
| 2009-06-29 | Linux Hardening & Security (cP/WHM + Apache) | 6839 | | | D | | Krun!x |
| 2009-06-22 | PE Infection – How to Inject a dll | 6754 | | | D | | Nightmare |
| 2009-06-22 | [french] Le Social Engineering : une attaque de persuasion | 4095 | | | D | | 599eme Man |
| 2009-06-17 | Advanced PostgreSQL SQL Injection and Filter Bypass Techniques | 6114 | | | D | | Leon Juranic |
| 2009-06-16 | Assault on PHP Applications | 7139 | | | D | | Aelphaeis Mangarae |
| 2009-06-16 | Cyclic Redundancy Check (CRC) | 3302 | | | D | | Livewire |
| 2009-06-11 | Web Application Firewall Bypass using HTTP Parameter Pollution | 6408 | | | D | | Lavakumar Kuppan |
| 2009-06-10 | Bypassing Hardware Based (DEP) on Windows 2003 SP 2 | 4432 | | | D | | SecureState |
| 2009-06-08 | MPI and Password Cracking | 4601 | | | D | | Jason R. Davis |
| 2009-06-08 | [french] Shellcodes sous Linux dans les processeurs de 32 bits x86 | 2898 | | | D | | opt!x hacker |
| 2009-06-01 | [italian] Don't trust in Technology | 2595 | | | D | | IHTeam |
| 2009-06-01 | Microsoft WPAD Technology Weakness | 3182 | | | D | | PTResearch |
| 2009-06-01 | HTTP Parameter Pollution - Yahoo! Mail classic attack | 7445 | | | D | | ikki |
| 2009-05-27 | [portuguese] Entendendo Injeção de SQL | 3188 | | | D | | K4m1k451 |
| 2009-05-27 | [arabic] Seh Buffer Overflows Explained | 3800 | | | D | | SecurityRules |
| 2009-05-22 | [Italian] How do I crack your WEP: The FMS attack explanation | 4213 | | | D | | Saitek |
| 2009-05-20 | [french] Bypass authentication with reverse engineering in linux x86 | 3794 | | | D | | Jonathan Salwan |
| 2009-05-14 | [arabic] how to crack serial numbers [reverse engineering] | 5751 | | | D | | Hakxer |
| 2009-05-08 | Reverse Code Engineering - mrinfo | 6824 | | | D | | Nightmare |
| 2009-05-08 | [portuguese] Explorando Stack Overflow no Windows | 4046 | | | D | | 6_Bl4ck9_f0x6 |
| 2009-05-05 | Hijacking LKM's event handler - FreeBSD case study | 3363 | | | D | | suN8Hclf |
| 2009-05-04 | Why certain SWF encryption techniques can backfire | 3475 | | | D | | Scott Muller |
| 2009-05-04 | [french] Bypass authentication with buffer overflow | 4636 | | | D | | Jonathan Salwan |
| 2009-04-30 | [persian] Router Sniffing Network Traffic via GRE Tunneling Attack’s | 3556 | | | D | | Ali Abbasi |
| 2009-04-23 | [Italian] Analysis and Working of a Rootkit in the Operative System | 3131 | | | D | | Saitek |
| 2009-04-23 | [Italian] Routers and Routing process explanation through the NAT | 3121 | | | D | | Saitek |
| 2009-04-14 | [portugues] Writing ettercap plugins | 3341 | | | D | | 0ut0fbound |
| 2009-04-14 | Controlling Malicious Software with the help of Shoutboxes | 4278 | | | D | | Feathers McGraw |
| 2009-04-14 | How Conficker makes use of MS08-067 | 11854 | | | D | | Bui Quang Minh |
| 2009-04-10 | Penetration: from application down to OS (IBM Websphere) | 3923 | | | D | | DSecRG |
| 2009-04-10 | Penetration: from application down to OS (Oracle) | 4783 | | | D | | DSecRG |
| 2009-04-08 | [french] Création des shellcodes sous architecture Linux x86 32 bits | 3561 | | | D | | Jonathan Salwan |
| 2009-04-06 | Pirelli Discus DRG A225 wifi router WPA2PSK Default Algorithm Vuln | 4892 | | | D | | j0rgan |
| 2009-04-06 | Preventing the spread of USB malware | 10111 | | | D | | Robin Bailey |
| 2009-03-26 | [german] Anonyme (und private) Kommunikation | 4831 | | | D | | Tobias |
| 2009-03-10 | [arabic] MS Internet Explorer XML Parsing Overflow | 5503 | | | D | | DATA_SNIPER |
| 2009-03-10 | [arabic] API Function Parametre Hijacking Vulnerability | 5250 | | | D | | DATA_SNIPER |
| 2009-03-09 | PHP Fuzzing In Action (Real world source code auditing) | 6978 | | | D | | Abysssec |
| 2009-03-09 | [spanish] Cracking WPA/WPA2-PSK with wordlist | 10166 | | | D | | ka0x |
| 2009-03-09 | MySQL: Secure Web Apps - SQL Injection Techniques | 19256 | | | D | | Omni |
| 2009-03-09 | [arabic] Adur[ IT ] Magazine : IT security # 1 issue | 4241 | | | D | | Adurit-T |
| 2009-03-06 | [portuguese] Amenizando Recusa de Servico Remota | 3194 | | | D | | 6_Bl4ck9_f0x6 |
| 2009-03-05 | TippingPoint IPS Signature Evasion by Packet Fragmentation | 2651 | | | D | | Chaitanya Sharma |
| 2009-03-05 | [spanish] La seguridad en sistemas informaticos | 2644 | | | D | | Cygog |
| 2009-03-05 | [spanish] Compilacion e interpretacion de exploits pl, php, py, c y c++ | 4058 | | | D | | Cygog |
| 2009-03-03 | Defeating the iPhone Passcode | 7127 | | | D | | Brad Antoniewicz |
| 2009-02-27 | [ezine] r3m #2 | 18444 | | | D | | r3m |
| 2009-02-27 | [spanish] clustering | 3152 | | | D | | Cygog |
| 2009-02-27 | [Morocco] Playing with cookies (ST1) | 4963 | | | D | | Stack |
| 2009-02-27 | [arabic] Perl Writing Exploits | 5362 | | | D | | Team Ksa Girls |
| 2009-02-24 | Wi-Foo Ninjitsu Exploitation | 7818 | | | D | | CWH Underground |
| 2009-02-23 | [spanish] Cross Site Printing | 2716 | | | D | | The X-C3LL |
| 2009-02-23 | Stack Overflow Exploitation, Real Life Example | 6613 | | | D | | DarkB0x |
| 2009-02-20 | Method to crash vsmon.exe ZoneAlarm/8.0.020.000 | 3891 | | | D | | quakerdoomer |
| 2009-02-17 | [french] Introduction to $_SERVER Superglobals Sniffing | 4843 | | | D | | p3Lo |
| 2009-02-16 | [ezine] RTM Essential # 6 | 5235 | | | D | | OpTix |
| 2009-02-12 | From Legal Frame Injection to Illegal Redirect | 5453 | | | D | | p3Lo |
| 2009-02-12 | From Boot to Remote Root - How I owned the network | 10730 | | | D | | Sumit Sharma |
| 2009-02-11 | Step By Step Format String Exploitation On Windows | 6762 | | | D | | Abysssec |
| 2009-02-11 | Fuzzing for Fun and Profit | 10629 | | | D | | Jeremy Brown |
| 2009-02-10 | PHP filesystem attack vectors | 5490 | | | D | | USH |
| 2009-02-10 | Practical SQL Injection: bit by bit | 9063 | | | D | | Frego |
| 2009-02-10 | [Persian] Web Application Security Consortium Glossary | 2832 | | | D | | Soroush Dalili |
| 2009-02-10 | Bypassing Windows Server 2008 Password Protection | 8296 | | | D | | Glafkos Charalambous |
| 2009-02-10 | Transferring Exploit code using HTML Canvas | 4117 | | | D | | BuMbL3B33 |
| 2009-02-05 | Exploiting Web 2.0 , Real Life XSS-Worm | 6208 | | | D | | Zigma |
| 2009-02-03 | Exploiting Web 2.0 , Real Life SQL INJECTION | 10082 | | | D | | AlpHaNiX |
| 2009-01-29 | [spanish] Telefonia IP | 4573 | | | D | | Cygog |
| 2009-01-29 | [spanish] Stack Overflow Como Si Estuviera En Primero | 3902 | | | D | | qpwoeiruty |
| 2009-01-29 | Full MSSQL Injection PWNage | 23119 | | | D | | CWH Underground |
| 2009-01-25 | Win Vista DLL Injection (32bit) | 6948 | | | D | | George Nicolaou |
| 2009-01-25 | Applied Binary Code Obfuscation | 4011 | | | D | | George Nicolaou |
| 2009-01-22 | Exploiting Buffer overflows | 7213 | | | D | | Kalgecin |
| 2009-01-22 | Mem - Jacking | 4940 | | | D | | Aodrulez |
| 2009-01-19 | [Persian] How to find ASP vulnerabilities by reading source code. (v1) | 5101 | | | D | | Soroush Dalili |
| 2009-01-19 | How to write a XSS (cross site scripting) worm for McCodes sites | 8054 | | | D | | PaPPy |
| 2009-01-16 | A Post-mortem of Yahoo! Account Security | 15656 | | | D | | Gammarays |
| 2009-01-14 | Linux on Power/Cell BE Architecture Buffer Overflow Vulnerabilities | 3486 | | | D | | RISE Security |
| 2009-01-12 | [spanish] Como Navegar Anonimamente en Internet | 3538 | | | D | | Pr@fEs0r X |
| 2009-01-12 | Arp Spoofing | 6945 | | | D | | Affix |
| 2009-01-12 | Short review of modern vulnerability research | 5067 | | | D | | Michal Bucko |
| 2008-12-29 | The Clickjacking meets XSS: a state of art | 9117 | | | D | | Nex |
| 2008-12-28 | w3af UserGuide French | 3718 | | | D | | Jerome Athias |
| 2008-10-07 | Shell Code For Beginners | 10373 | | | D | | Beenu Arora |
| 2008-10-07 | [ezine] CraCkEr #1 | 7093 | | | D | | CraCkEr |
| 2008-10-03 | Assault on Oracle PL/SQL - Injection | 6192 | | | D | | Aelphaeis Mangarae |
| 2008-10-03 | TARGETING VOIP | 5525 | | | D | | Kendric Tang |
| 2008-09-28 | Introduction to SQL injection | 20887 | | | D | | Dapirates |
| 2008-09-28 | [portuguese] Playing with sockets (port scanning) | 4280 | | | D | | Th1nk3r |
| 2008-09-14 | Playing with sockets (port scanning) | 10620 | | | D | | Pepelux |
| 2008-09-10 | The Pirate Bay un-SSL | 10145 | | | D | | Stanislaw Pusep |
| 2008-09-09 | Client Side Security.. More severe than it seems...
| 6274 | | | D | | Nex |
| 2008-09-05 | The Five Ws of Citect ODBC Vulnerability CVE-2008-2639 | 8516 | | | D | | Kevin Finisterre |
| 2008-09-04 | Gadgets: New Tech & Old Threats | 5743 | | | D | | NCC Group |
| 2008-09-02 | ASLR bypassing method on 2.6.17/20 Linux Kernel | 7659 | | | D | | sorrow |
| 2008-08-28 | [ezine] r3m | 35849 | | | D | | r3m |
| 2008-08-19 | Breaking the Windows Server 2003 SP2 Stack | 11163 | | | D | | kcope |
| 2008-08-19 | Data-mining with SQL Injection and Inference | 7514 | | | D | | David Litchfield |
| 2008-08-19 | [spanish] Técnicas de inyección en MySQL | 10723 | | | D | | ka0x |
| 2008-08-19 | Reverse Engineering: Smashing the Signature | 8081 | | | D | | George Nicolaou |
| 2008-08-18 | Playing around with (old?) SEH | 4891 | | | D | | suN8Hclf |
| 2008-08-18 | [german] Sybase SQL Injection && Bypassing mod_security | 4864 | | | D | | Thomas Kerbl |
| 2008-08-18 | [german] A german guide to WEP/WPA cracking | 7106 | | | D | | Johannes Greil |
| 2008-07-26 | Simple Web-Hacking Techniques | 24451 | | | D | | Nikolaos Rangos |
| 2008-07-15 | Auditing mailing scripts for web app pentesters
| 7743 | | | D | | Adrian "pagvac" Pastor |
| 2008-06-26 | Reverse Engineering: Anti-Cracking Techniques
| 13068 | | | D | | George Nicolaou |
| 2008-06-03 | COODE MAGAZINE NR3 | 14323 | | | D | | fl0 fl0w |
| 2008-06-03 | [spanish] Cross Site Scripting [XSS] | 13066 | | | D | | sl4xUz |
| 2008-05-23 | Shellcode locations and buffer overflows in Windows | 17675 | | | D | | suN8Hclf |
| 2008-05-22 | Full SQL Injection Tutorial (MySQL) | 112484 | | | D | | Marezzi |
| 2008-05-22 | [french] Programming Kernel Modules | 8176 | | | D | | Benjamin Roux |
| 2008-05-22 | Hacking Guide (basics -> Intermediate) | 32802 | | | D | | sup3rm4n |
| 2008-05-15 | Symantec Altiris Deployment Solution Elevation of Privileges Vulns | 7154 | | | D | | Alex Hernandez |
| 2008-12-28 | Discussing Secure Input Solutions for Web Applications | 3998 | | | D | | Angelo Rosiello |
| 2008-12-12 | Linux Slab Allocator Buffer Overflow Vulnerabilities (pt_BR) | 5235 | | | D | | RISE Security |
| 2008-12-12 | IGUJV - Infection Guide Using Java/VbScript | 9312 | | | D | | AnalyseR |
| 2008-12-08 | LFI to RCE Exploit with Perl Script | 16911 | | | D | | CWH Underground |
| 2008-12-02 | Reverse Engineering “Microsoft F#” | 8090 | | | D | | Aodrulez |
| 2008-12-01 | Frame Pointer Overwrite Demonstration [LINUX] | 4397 | | | D | | Jeremy Brown |
| 2008-12-01 | Format String Exploitation Demonstration [LINUX] | 5588 | | | D | | Jeremy Brown |
| 2008-11-20 | cracking the basics | 12350 | | | D | | Livewire |
| 2008-11-19 | Java 2 Micro Edition Based Computer Malware Propagation Technique | 5965 | | | D | | Aodrulez |
| 2008-11-17 | [ezine] RTM essential #5 | 5909 | | | D | | OpTix |
| 2008-11-12 | EXPLORATiON iN THE CROSS TERRiTORY | 6615 | | | D | | Xylitol |
| 2008-11-12 | Security Vulnerabilities in SOHO Routers | 5788 | | | D | | SourceSec Dev Team |
| 2008-11-10 | Practical attacks against WEP and WPA | 13236 | | | D | | Martin Beck / Erik Tews |
| 2008-11-09 | Using Parent Domain Traversal in Drive By Attacks | 6248 | | | D | | hkm |
| 2008-11-08 | Sponsored Links Jacking | 5646 | | | D | | Yaniv Miron |
| 2008-11-05 | [spanish] H-Zine #1 | 4056 | | | D | | H-zine |
| 2008-11-02 | i sh0t the white hat 4 | 17795 | | | D | | pr0j3kt m4yh3m br4z1l |
| 2008-11-01 | Internet Banking Flaws in India | 7823 | | | D | | webDEViL |
| 2008-10-31 | Reflective DLL Injection | 4682 | | | D | | Stephen Fewer |
| 2008-10-26 | [spanish] 1001 ways to crack software | 5343 | | | D | | Pr@fEs0r X |
| 2008-10-26 | [portuguese] SQL Injection: Anatomy of an Attack | 7649 | | | D | | liquido |
| 2008-10-20 | Fuzzing: A Useful Approach to Finding Bugs | 8132 | | | D | | Jeremy Brown |
| 2008-10-19 | [farsi] Detecting and Exploiting Vulnerability in ActiveX Controls | 5488 | | | D | | Shahriyar Jalayeri |
| 2008-10-16 | The Hacker's RFC | 13855 | | | D | | fckD |
| 2008-10-13 | Exploiting Tomorrow's Internet Today: Penetration testing with IPv6 | 5786 | | | D | | H D Moore |
| 2008-10-13 | Analyzing local privilege escalations in win32k | 4697 | | | D | | mxatone |
| 2008-10-13 | Using dual-mappings to evade automated unpackers | 4001 | | | D | | skape |
| 2008-10-13 | Unlocking the Verizon Wireless xv6800 (HTC Titan) GPS | 4809 | | | D | | Skywing |
| 2008-10-12 | Web vulnerabilities to gain access to the system | 12220 | | | D | | Pepelux |
| 2008-10-07 | [spanish] f**king the Web Apps [LFI #1 - attack edition] | 5876 | | | D | | JosS |
| 2008-05-14 | [spanish] Cross Site Request Forgery [ CSRF / XSRF ] | 6411 | | | D | | Tec-n0x |
| 2008-05-09 | [ezine] ZFO 4 | 30406 | | | D | | ZFO |
| 2008-04-30 | Access Through Access | 9739 | | | D | | Brett Moore |
| 2008-04-24 | Lateral SQL Injection: A New Class of Vulnerability in Oracle
| 8297 | | | D | | David Litchfield |
| 2008-04-24 | [spanish] Blind MySQL Injection | 13178 | | | D | | ka0x |
| 2008-04-21 | Security Implications of Windows Access Tokens | 5500 | | | D | | Luke Jennings |
| 2008-03-21 | [ezine] Perl Underground 5 | 15933 | | | D | | Perl Underground |
| 2008-02-22 | 802.11 Attacks | 27971 | | | D | | Brad Antoniewicz |
| 2008-02-18 | Cross Site Scripting - Attack and Defense guide | 30519 | | | D | | Xylitol |
| 2008-01-28 | ActiveX - Active Exploitation | 14101 | | | D | | warlord |
| 2007-12-27 | Error based SQL Injection | 25322 | | | D | | AnalyseR |
| 2007-12-27 | An Insecurity Overview of the March Networks DVR-CCTV 3204 | 10677 | | | D | | Alex Hernandez |
| 2007-12-18 | ptrace(): A Linux Virus | 19406 | | | D | | Omni |
| 2007-12-08 | Securing & Hardening Linux v1.0 | 12827 | | | D | | Glafkos Charalambous |
| 2007-12-08 | SEH Overwrites Simplified | 8599 | | | D | | Aelphaeis Mangarae |
| 2007-11-29 | MS API function pointers hijacking | 9577 | | | D | | shinnai |
| 2007-11-05 | [spanish] Introduccion a los overflows en Linux x86_64 | 7045 | | | D | | RaiSe |
| 2007-11-04 | LDAP injections | 12248 | | | D | | ka0x |
| 2007-11-02 | Preventing CSRF | 8046 | | | D | | Nex |
| 2007-10-22 | Arbitrary header injection in PHP contact forms | 11833 | | | D | | Mohammed Johnson |
| 2007-10-17 | [ezine] .aware eZine Beta - Overground Hacking | 13053 | | | D | | .aware |
| 2007-10-07 | Check Point Secure Platform Hack | 8794 | | | D | | Hugo Vazquez |
| 2007-10-01 | High-Level Reverse Engineering | 11929 | | | D | | Matthew Lewis |
| 2007-08-27 | Tactical Exploitation and Response Over Solaris Sparc 5.8 / 5.9 Systems | 8380 | | | D | | Alex Hernandez |
| 2007-08-15 | Php Endangers - Remote Code Execution | 18545 | | | D | | Arham Muhammad |
| 2007-08-14 | XSS The Complete Walkthrough | 29886 | | | D | | t0pP8uZz |
| 2007-08-14 | Uncommon SQL Injection | 29111 | | | D | | N3T D3VIL |
| 2007-08-14 | [ezine] ZFO 3 | 38167 | | | D | | ZFO |
| 2007-08-10 | Oracle Forensics Part 5: Finding Evidence of Data Theft in the Absence .. | 5059 | | | D | | David Litchfield |
| 2007-08-10 | Tactical Exploitation | 13902 | | | D | | H D Moore |
| 2007-08-07 | Discovery of Local BoF exploits | 7852 | | | D | | Affix |
| 2007-07-11 | Anti Forensics: making computer forensics hard | 12726 | | | D | | dum_dum |
| 2007-07-06 | Having Fun with Proventia GX5108 & GX5008 Insecurities | 7406 | | | D | | Alex Hernandez |
| 2007-07-04 | Buffer Truncation Abuse in Microsoft SQL Server Based Applications | 7398 | | | D | | Gary O'Leary-Steele |
| 2007-06-27 | Cisco IOS Exploitation Techniques | 13746 | | | D | | Gyan Chawdhary |
| 2007-06-16 | Having Fun With PostgreSQL | 11782 | | | D | | Nico Leidecker |
| 2007-06-14 | Secure file upload in PHP web applications | 14915 | | | D | | Alla Bezroutchko |
| 2007-06-10 | [eZine] exploit.this 0x01 | 13930 | | | D | | CypherXero |
| 2007-06-07 | Cross Site Scripting filtration Bypass | 11826 | | | D | | Arham Muhammad |
| 2007-06-04 | Explanation of a remote buffer overflow vulnerability | 10132 | | | D | | Denis Maggiorotto |
| 2007-06-04 | Exploitation for phun and profit | 10983 | | | D | | Michal Bucko |
| 2007-05-21 | Cross Site Request Forgery: the Sea Surf | 9039 | | | D | | Nex |
| 2007-05-17 | Oracle Forensics Part 1: Dissecting the Redo Logs | 5895 | | | D | | David Litchfield |
| 2007-05-17 | Oracle Forensics Part 2: Locating Dropped Objects | 4907 | | | D | | David Litchfield |
| 2007-05-17 | Oracle Forensics Part 3: Isolating Evidence of Attacks | 5243 | | | D | | David Litchfield |
| 2007-05-17 | Oracle Forensics Part 4: Live Response | 5417 | | | D | | David Litchfield |
| 2007-04-24 | Bypass RPC portmapper filtering security PoC | 8493 | | | D | | David Routin |
| 2007-04-19 | Heap Feng Shui in JavaScript | 8665 | | | D | | Alexander Sotirov |
| 2007-04-18 | Buffer Overflow testing on gentoo gcc 4.1.1 | 9511 | | | D | | xwings |
| 2007-04-13 | Advanced exploitation in exec-shield (Fedora Core case study) | 12586 | | | D | | Xpl017Elz |
| 2007-04-12 | JaSiLDBG - JavaScript inLine Debugger | 6740 | | | D | | SirDarckCat |
| 2007-04-12 | PHP Underground Security | 18500 | | | D | | Omni |
| 2007-04-12 | New Benchmark alternative or effective blind SQL-injection | 13321 | | | D | | Elekt |
| 2007-04-11 | Cross-Site Scripting for Fun and Profit | 11141 | | | D | | Nex |
| 2007-04-09 | LINUX SHELLCODING REFERENCE | 8395 | | | D | | Nex |
| 2007-04-06 | [ezine] HackThisZine #5 - Squat The Net! | 8320 | | | D | | HackThisZine |
| 2007-04-03 | [ezine] Perl Underground 4 | 11929 | | | D | | Perl Underground |
| 2007-03-26 | Win32 Stack BufferOverFlow Real Life Vuln-Dev Process | 10354 | | | D | | Sergio Alvarez |
| 2007-03-09 | PORT SCANNING TECHNIQUES | 28037 | | | D | | Kris Katterjohn |
| 2007-02-23 | Stack Overflow Exploitation Explained | 18763 | | | D | | Aelphaeis Mangarae |
| 2007-02-21 | Overtaking Google Desktop | 12681 | | | D | | Watchfire |
| 2007-02-18 | xss2phishing | 12781 | | | D | | behindthehills |
| 2007-01-29 | Stack Overflow IRC Lecture | 16840 | | | D | | Aelphaeis Mangarae |
| 2007-01-26 | [ezine] .aware eZine Alpha - Overground Hacking | 10843 | | | D | | .aware |
| 2007-01-25 | MoAB Comic 1 | 8064 | | | D | | MoAB |
| 2007-01-18 | [ezine] ZFO 2 | 19761 | | | D | | ZFO |
| 2007-01-10 | Anatomy of a Malware | 10392 | | | D | | Nicolas Falliere |
| 2007-01-03 | Cracking PlasmaVis (Making a Keygen in C) | 20656 | | | D | | SlimTim10 |
| 2007-01-01 | WebMin (XSS BUG) Remote Arbitary File Disclosure | 12157 | | | D | | UmZ |
| 2006-12-31 | Cookie Stealing Upgrade: Ajax Style | 16376 | | | D | | unlimitedorb |
| 2006-12-30 | Introduction to GCC Inline Asm | 6337 | | | D | | batched |
| 2006-12-30 | ARM GCC Inline Assembler Paper | 11161 | | | D | | batched |
| 2006-12-30 | Shellcoding for Linux and Windows Tutorial | 10854 | | | D | | Steve Hanna |
| 2006-12-29 | Beginning cracking of (x86) Window's software and software protection | 15346 | | | D | | n/a |
| 2006-12-18 | Simple Metasploit in Action! | 17371 | | | D | | Cyberheb |
| 2006-12-17 | Writeup about source code auditing: How to to break code by reading it | 10431 | | | D | | kcope |
| 2006-12-11 | Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass | 10532 | | | D | | Alexander Anisimov |
| 2006-12-11 | Bypassing Windows heap protections | 7083 | | | D | | Nicolas Falliere |
| 2006-12-03 | Writing Self-Modifying Code and
Utilizing Advanced Assembly Techniques | 10006 | | | D | | xort |
| 2006-12-01 | Blackberry Security: Ripe for the picking? | 11160 | | | D | | James O'Connor |
| 2006-11-27 | Dangling Cursor Snarfing: A New Class of Attack in Oracle | 7318 | | | D | | David Litchfield |
| 2006-11-24 | [ezine] ZFO | 25611 | | | D | | ZFO |
| 2006-11-22 | On the Effectiveness of AddressSpace
Randomization | 6118 | | | D | | Stanford University |
| 2006-11-22 | Cracking String Encryption in Java Obfuscated Bytecode | 8116 | | | D | | Subere |
| 2006-11-16 | Implementing and Detecting a PCI Rootkit | 8277 | | | D | | John Heasman |
| 2006-11-14 | John The Ripper - An Illustrated Guide | 16297 | | | D | | Ethernet |
| 2006-11-12 | Vulnerability Enumeration For Penetration Testing | 14899 | | | D | | Aelphaeis Mangarae |
| 2006-11-10 | Basic differences between x86 Assembly and X86-64 Assembly | 15703 | | | D | | hophet |
| 2006-11-09 | IE ActiveX-based 0-days basics Demystified | 8720 | | | D | | Michal Bucko |
| 2006-11-07 | Attacking the Code: Source Code Auditing | 9644 | | | D | | bannedit |
| 2006-11-02 | A few of J2EE-based web applications common vulnerabilities | 6651 | | | D | | Michal Bucko |
| 2006-11-01 | API Interception via DLL Redirection | 9418 | | | D | | Craig Heffner |
| 2006-11-01 | Remote / Local File Inclusion Exploits | 13010 | | | D | | sunjester |
| 2006-10-22 | Rainbow Tables Explained | 11320 | | | D | | Warpboy |
| 2006-10-18 | An alternative method in format string exploitation | 6513 | | | D | | K-sPecial |
| 2006-10-13 | Smashing The Kernel For Fun And Profit | 10097 | | | D | | Dark-Angel |
| 2006-10-13 | Implementing a Custom X86 Encoder | 4792 | | | D | | skape |
| 2006-10-12 | Obtain sys_call_table on amd64(x86_64) | 4958 | | | D | | pouik |
| 2006-10-10 | Basic Buffer Overflow Exploitation Explained | 14883 | | | D | | mercy |
| 2006-10-10 | Adjacent Memory Overflows | 5388 | | | D | | mercy |
| 2006-10-10 | Undefined Behavior | 4614 | | | D | | mercy |
| 2006-10-03 | Circumventing the VA kernel patch For Fun and Profit | 7420 | | | D | | phetips |
| 2006-10-02 | [ezine] Perl Underground 1 | 13376 | | | D | | Perl Underground |
| 2006-10-02 | [ezine] Perl Underground 2 | 8485 | | | D | | Perl Underground |
| 2006-10-02 | [ezine] Perl Underground 3 | 8329 | | | D | | Perl Underground |
| 2006-10-02 | [ezine] h0no 1 | 17910 | | | D | | h0no |
| 2006-10-02 | [ezine] h0no 2 | 17838 | | | D | | h0no |
| 2006-10-02 | [ezine] h0no 3 | 14977 | | | D | | h0no |
| 2006-09-27 | Disrespect Copyrights in Practice | 5966 | | | D | | Nomenumbra |
| 2006-09-27 | Exotic Vulnerabilities | 7747 | | | D | | Nomenumbra |
| 2006-09-24 | Learning Perl - Writing Exploits | 16059 | | | D | | Warpboy |
| 2006-09-18 | Metasploit 3.0 Automated Exploitation | 23026 | | | D | | H D Moore |
| 2006-09-17 | Analysis of brute force & dictionary attacks | 9171 | | | D | | Zapotek |
| 2006-09-04 | Smashing the Modern Stack for Fun and Profit | 12551 | | | D | | Craig Heffner |
| 2006-08-30 | Linux Per-Process Syscall Hooking | 6045 | | | D | | Pluf |
| 2006-08-26 | Buffer Overflows, a peek under the hood v1.0 | 9549 | | | D | | Zapotek |
| 2006-08-20 | Hardening Windows NT [2K, XP, 2003] | 17235 | | | D | | Aelphaeis Mangarae |
| 2006-08-08 | Remote Exploitation with C and Perl | 18962 | | | D | | Preddy |
| 2006-08-01 | Learn Information Gathering By Example | 13942 | | | D | | Aelphaeis Mangarae |
| 2006-08-01 | Remote Exploiting Through Payload Rewriting | 7471 | | | D | | poplix |
| 2006-04-08 | Crafting Symlinks for Fun and Profit | 4383 | | | D | | shaun2k2 |
| 2006-04-08 | Social Engineering, Definition, True Stories and Examples | 7295 | | | D | | Simo |
| 2006-04-08 | Simple Buffer Overflow Demonstration | 9231 | | | D | | Simo |
| 2006-04-08 | Further Advances in Exploiting Vulnerable Format String Bugs | 5344 | | | D | | c0ntex |
| 2006-04-08 | How to Hijack the Global Offset Table with pointers | 4976 | | | D | | c0ntex |
| 2006-04-08 | Bypassing non-executable-stack during Exploitation (return-to-libc) | 6269 | | | D | | c0ntex |
| 2006-04-08 | Using GDB to Develop Exploits - A Basic Run Through | 7458 | | | D | | c0ntex |
| 2006-04-08 | Abusing the Internet with Popular Search Engine Technologies | 8316 | | | D | | c0ntex |
| 2006-04-08 | Exploiting x86 Stack Based Buffer Overflows | 7794 | | | D | | c0ntex |
| 2006-04-08 | Writing Behind a Buffer | 4938 | | | D | | Angelo Rosiello |
| 2006-04-08 | Tutorial About Format Bugs | 5595 | | | D | | Angelo Rosiello |
| 2006-04-08 | ARC: A Synchronous Stream Cipher from Hash | 4187 | | | D | | Angelo Rosiello |
| 2006-04-08 | The Basics of Shellcoding | 6358 | | | D | | Angelo Rosiello |
| 2006-04-08 | Web Forms and Untraceable DDoS Attacks | 12834 | | | D | | Markus Jakobsson |
| 2006-04-08 | Practical SEH Exploitation | 5424 | | | D | | Johnny Cyberpunk |
| 2006-04-08 | Shattering SEH | 4258 | | | D | | Brett Moore |
| 2006-04-08 | Reverse Engineering - functions... functions! functions!? | 5607 | | | D | | mercy |
| 2006-04-08 | Reconstructing Binaries to C for Beginners | 4776 | | | D | | mercy |
| 2006-04-08 | PowerPC / OS X (Darwin) Shellcode Assembly | 4956 | | | D | | B-r00t |
| 2006-04-08 | Writing Shellcode on SPARC | 4247 | | | D | | lhall |
| 2006-04-08 | Writing Assembly on OpenBSD | 5968 | | | D | | lhall |
| 2006-04-08 | Linux Assembly and Disassembly an Introduction | 17663 | | | D | | lhall |
| 2006-04-08 | Linux Assembly and Disassembly the Basics | 8957 | | | D | | lhall |
| 2006-04-08 | Writing Assembler for FreeBSD | 5062 | | | D | | lhall |
| 2006-04-08 | Introduction to the x86 Stack | 8530 | | | D | | lhall |
| 2006-04-08 | Introduction to Writing Shellcode | 8593 | | | D | | lhall |
| 2006-04-08 | Intro to Functions in Assembly | 8184 | | | D | | lhall |
| 2006-03-28 | Steganography FAQ | 10132 | | | D | | Aelphaeis Mangarae |
| 2006-03-28 | SQL Injection Paper [BlackSecurity.org] | 28312 | | | D | | zeroday |
| 2006-03-15 | The Voyage To 0-Day Using the Metasploit Framework | 9593 | | | D | | Vijay Mukhi |
| 2006-03-15 | Weaknesses in Web-Applications v1.3 | 10433 | | | D | | theblacksheep |
| 2006-03-14 | WLSI Windows Local Shellcode Injection | 7412 | | | D | | Cesar Cerrudo |
| 2006-03-11 | Practical Windows and Linux Shellcode Design | 13543 | | | D | | Nomenumbra |
| 2006-03-10 | Smack the Stack ( Advanced Buffer Overflow Methods ) | 9888 | | | D | | izik |
| 2006-03-10 | Reverse Engineering with LD_PRELOAD | 6859 | | | D | | izik |
| 2006-03-10 | Abusing .CTORS and .DTORS For FUN and PROFIT | 5660 | | | D | | izik |
| 2006-03-09 | Function Stack Frame Manipulation | 7147 | | | D | | barros |
| 2006-03-09 | Solution To Red Hat PIE protection | 4813 | | | D | | Fr0z3n |
| 2006-03-09 | How to hijack the Global Offset Table with pointers for root shells | 16121 | | | D | | c0ntex |
| 2006-03-09 | Local Stack Overflow (Basic Module) | 7717 | | | D | | Gotfault Security |
| 2006-03-09 | Format Strings (Gotfault Security Community) | 7601 | | | D | | Gotfault Security |
| 2006-03-09 | Local Stack Overflow (Advanced Module) | 8323 | | | D | | Gotfault Security |