Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💥 Exploit Development
Specific
exploit writing, vulnerability research, shellcode, pwn
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
199699
posts in
24.2
ms
Exploit Writing Tutorial Part 2 -
Jumping
to
shellcode
💥
Exploit Dev
corelan.be
·
5d
NGINX
Rift:
Achieving
NGINX
Remote Code Execution via an 18-Year-Old Vulnerability
💥
Exploit Dev
depthfirst.com
·
1d
·
Lobsters
,
Hacker News
,
r/netsec
First public macOS kernel memory corruption
exploit
on Apple
M5
💣
Binary Exploitation
blog.calif.io
·
27m
·
Hacker News
Tune
In: The Future of AI-Powered
Vulnerability
Discovery
🔓
Vulnerability Research
crowdstrike.com
·
10h
AI Vulnerability Research and the
Fuzzer
Era
Déjà
Vu: Why the Numbers Are Only Half the Story
🌍
Browser Exploits
voidsec.com
·
2d
·
Hacker News
,
r/netsec
Q&A: Why Vulnerability
Scans
Are Giving Businesses a
False
Sense of Security
🔓
Vulnerability Research
itsecurityguru.org
·
8h
GTIG
AI Threat Tracker:
Adversaries
Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
🛡️
AI Security
malware.news
·
3d
Postmortem
:
TanStack
NPM supply-chain compromise
🌍
Browser Exploits
tanstack.com
·
2d
·
DEV
,
Lobsters
,
Hacker News
,
Hacker News
,
r/netsec
,
r/programming
New Exim
BDAT
Vulnerability Exposes
GnuTLS
Builds to Potential Code Execution
💣
Binary Exploitation
thehackernews.com
·
2d
The 90 Day
disclosure
policy is dead
🐛
Bug Bounty
blog.himanshuanand.com
·
4d
·
Lobsters
,
Hacker News
,
r/sysadmin
The 90-day vulnerability disclosure policy is dead, as LLMs
compress
bug finding and exploit development time, and critical issues must be
patched
immediately (...
🔓
Vulnerability Research
techmeme.com
·
3d
Local privilege escalation vulnerabilities in the Linux kernel are very common.
However
, the vast majority are memory corruption bugs rather than these
memor
...
💣
Binary Exploitation
grapheneos.social
·
6d
Hackers
Use AI for
Exploit
Development, Attack Automation
🔓
Hacking
darkreading.com
·
3d
Google discovers
weaponized
zero-day
exploits
created with AI
🛡️
AI Security
csoonline.com
·
3d
200,000 WordPress Sites at Risk from Critical Authentication Bypass Vulnerability in
Burst
Statistics
Plugin
🛡️
OWASP
malware.news
·
1d
Nginx Rift:
RCE
via
heap
buffer overflow in rewrite module (CVE-2026-42945)
🌍
Browser Exploits
depthfirst.com
·
1d
·
Hacker News
,
Hacker News
Linux has a
relentless
flood of severe memory corruption bugs being discovered. Nearly all exploit chains for Linux-based systems by commercial and
governmen
...
💣
Binary Exploitation
grapheneos.social
·
6d
Adversaries
leverage AI for vulnerability
exploitation
, augmented operations, and initial access
🛡️
AI Security
cloud.google.com
·
2d
·
Hacker News
GTIG
AI Threat Tracker:
Adversaries
Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
🛡️
AI Security
cloud.google.com
·
3d
·
Hacker News
,
r/programming
First public macOS kernel memory corruption
exploit
on Apple
M5
💣
Binary Exploitation
malware.news
·
3h
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help