Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Penetration Testing
Red Team, Exploits, Vulnerability Assessment
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
8015
posts in
14.2
ms
Penetration
testing
🌐
Network Security
aniketdeshmukh0777.medium.com
·
3d
Autonomous
AI
Penetration
Testing
🛡️
Security Type Systems
llmtary.com
·
1d
·
Hacker News
There Are Zero-Day
Exploits
for Your
Mind
🚂
Error Propagation
mikemorgenstern.substack.com
·
19h
·
Substack
delve
fabricated 494 reports. but even the "real" SOC 2
pentests
are mostly theater.
🎯
Taint Analysis
codeant.ai
·
1d
·
r/sysadmin
There Are Zero-Day
Exploits
for Your
Mind
🚂
Error Propagation
news.ycombinator.com
·
19h
·
Hacker News
Penetration
Testing Contract Agreement (Beginner-Friendly Guide + Open
Template
)
🛡️
Cybersecurity
medium.com
·
4d
Hackers or
Hallucinators
? A Comprehensive Analysis of LLM-Based Automated
Penetration
Testing
🎯
Finite Automata
arxiv.org
·
2d
Beyond the
Chatbot
: How Claude Code Is Turning Security
Audits
Into a One-Command Workflow
🚂
Cranelift IR
hackarandas.com
·
2d
·
Hacker News
A
Systematic
Security Evaluation of OpenClaw and Its
Variants
🔓
Binary Exploitation
arxiv.org
·
4d
Project
Glasswing
: Anthropic Built an AI That Finds Zero-Days, Then
Refused
to Release It
🔓
Binary Exploitation
techupkeep.dev
·
2d
·
r/netsec
,
r/programming
Astrosp/Awesome-OSINT-For-Everything
: OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team
oprations
and more.
🛡️
Security Type Systems
github.com
·
5d
OpenAI #16: A History and a
Proposal
🧠
Obsidian
thezvi.substack.com
·
2d
·
Substack
SALLIE
:
Safeguarding
Against Latent Language & Image Exploits
🔓
Binary Exploitation
arxiv.org
·
1d
Thirty-Six Malicious npm
Strapi
Packages Deploy Redis RCE, Database Theft, and Persistent
C2
🔓
Binary Exploitation
safedep.io
·
6d
·
Hacker News
Vulnerability
Research Is
Cooked
🚂
Error Propagation
simonwillison.net
·
6d
From
Incomplete
Architecture to
Quantified
Risk: Multimodal LLM-Driven Security Assessment for Cyber-Physical Systems
🛡️
Security Type Systems
arxiv.org
·
2d
RPM-Net
Reciprocal Point
MLP
Network for Unknown Network Security Threat Detection
🕸️
Interaction Nets
arxiv.org
·
1d
Mapping the
Exploitation
Surface: A 10,000-Trial
Taxonomy
of What Makes LLM Agents Exploit Vulnerabilities
🛡️
Security Type Systems
arxiv.org
·
3d
"I See What You Did There": Can Large Vision-Language Models
Understand
Multimodal
Puns
?
🔍
Tokenizers
arxiv.org
·
2d
From
Clues
to Generation: Language-Guided
Conditional
Diffusion for Cross-Domain Recommendation
🔍
RAG
arxiv.org
·
2d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help