Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Buffer Overflow, Shellcode, CTF, Reverse Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
7987
posts in
12.9
ms
CREBench
: Evaluating Large Language Models in
Cryptographic
Binary Reverse Engineering
🎯
Finite Automata
arxiv.org
·
3d
another memory
corruption
case
🌳
Tree Shaking
trofi.github.io
·
2d
·
Lobsters
,
Hacker News
aloshdenny/reverse-SynthID
: reverse engineering Gemini's
SynthID
detection
🔍
Lens Libraries
github.com
·
14h
·
Hacker News
How Pizza Tycoon (1994)
simulated
traffic on a 25
MHz
CPU
💬
Smalltalk VMs
pizzalegacy.nl
·
1d
·
Lobsters
,
Hacker News
,
Hacker News
,
r/coding
,
r/programming
Alice
GG
• Protecting Godot games against reverse engineering
🛡️
Security Type Systems
alicegg.tech
·
6d
·
Hacker News
,
r/godot
LLM4CodeRE
: Generative AI for Code
Decompilation
Analysis and Reverse Engineering
🎭
Program Synthesis
arxiv.org
·
2d
Reverse
Engineering
Basics
🔪
Program Slicing
medium.com
·
5d
Spilling
the Neural
Tea
: A Journey Down the Side-Channel
🗺️
Region Inference
sigarch.org
·
3d
·
Hacker News
Vulnerability
Research Is
Cooked
🚂
Error Propagation
simonwillison.net
·
6d
I built a
checksec-inspired
binary hardening checker in Rust -- ELF/PE/Mach-O with
SARIF
output
🚂
Cranelift IR
github.com
·
2d
·
r/rust
The
Blueprint
of a North
Korean
Attack on Open-Source
📚
Self-Documenting Code
casco.com
·
2d
·
Hacker News
,
r/javascript
From
bytecode
to bytes: automated magic
packet
generation
🎯
Escape Analysis
blog.cloudflare.com
·
1d
·
Hacker News
When the
compiler
lies
: breaking memory safety in safe Go
🎯
Escape Analysis
ciolek.dev
·
2d
·
Lobsters
,
Hacker News
Scaling AI
Vulnerability
Scanning
Beyond One File at a Time
🛡️
Penetration Testing
brian-chastain.com
·
2d
·
Hacker News
SALLIE
:
Safeguarding
Against Latent Language & Image Exploits
💬
Prompt Engineering
arxiv.org
·
1d
A fully reproducible C
toolchain
rooted on
POSIX
shell
📚
Forth Compilers
umontreal.scholaris.ca
·
6d
·
Hacker News
Automatic removal of
junk
instructions
through state tracking (2018)
🚀
Code Motion
usualsuspect.re
·
5d
·
Hacker News
Darksp33d/hyperhives-macos-infostealer-analysis
: Full static analysis of
HyperHives
macOS Rust infostealer — 571 decrypted config values, C2 infrastructure, DPRK/Contagious Interview attribution, YARA/Sigma rules, STIX 2.1 bundle, ATT&CK Navigator layer
🛡️
Security Type Systems
github.com
·
3d
·
Hacker News
A tail-call
interpreter
in (
nightly
) Rust
🚂
Cranelift IR
mattkeeter.com
·
4d
·
Lobsters
,
Hacker News
,
r/rust
hamzamiladin/Vulnchain
: AI-powered multi-language security scanner: 154 Semgrep rules, 13 Joern CPG scripts, AI code detection, and attack-chain correlation
🚂
Cranelift IR
github.com
·
3d
·
Hacker News
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help