http://intranet.dpim.go.th/games/alb/album.php?albcode=046
http://intranet.dpim.go.th/games/alb/album.php?albcode=046 notified by N213
http://mining.dpim.go.th/alb/album.php?albcode=001
http://mining.dpim.go.th/alb/album.php?albcode=001 notified by N213
http://licensing.dpim.go.th/alb/album.php?albcode=001
http://licensing.dpim.go.th/alb/album.php?albcode=001 notified by N213
http://opim5.dpim.go.th/alb/album.php?albcode=001
http://opim5.dpim.go.th/alb/album.php?albcode=001 notified by N213
http://opim6.dpim.go.th/alb/album.php?albcode=001
http://opim6.dpim.go.th/alb/album.php?albcode=001 notified by N213
http://opim7.dpim.go.th/alb/album.php?albcode=021
http://opim7.dpim.go.th/alb/album.php?albcode=021 notified by N213
http://activity.skn.go.th/index.php
http://activity.skn.go.th/index.php notified by Ashiyane Digital Security Team
http://napaeng.go.th/count.txt
http://napaeng.go.th/count.txt notified by Ashiyane Digital Security Team
[papers] – Transferable State Attack on Iterated Hashing Functions
Transferable State Attack on Iterated Hashing Functions