Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🚩 CTF
capture the flag, pwn, binary exploitation, CTF writeup
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
3171
posts in
13.7
ms
RowHammer
Vulnerability Counter (
RVC
): Redefining
RowHammer
Detection with Victim-Centric Tracking
🔍
Memory Forensics
arxiv.org
·
2d
GenDetect
: Generalizing Reactive Detection for Resilience Against
Imitative
DeFi Attack Cascade
🛡️
Exploit Mitigations
arxiv.org
·
19h
Provably
Secure
Steganography
Based on List Decoding
🐚
Shellcoding
arxiv.org
·
6d
Identifying and
Characterizing
Semantic Clones of
Solidity
Functions
🔀
Concolic Execution
arxiv.org
·
19h
Dynamic
Cyber
Ranges
🛡️
Exploit Mitigations
arxiv.org
·
2d
Automation-Exploit: A Multi-Agent LLM Framework for Adaptive Offensive Security with Digital Twin-Based
Risk-Mitigated
Exploitation
🛡️
Exploit Mitigations
arxiv.org
·
3d
One Word at a Time:
Incremental
Completion
Decomposition
Breaks LLM Safety
🧩
Intermediate Representation
arxiv.org
·
19h
SAFEdit
: Does Multi-Agent Decomposition Resolve the Reliability Challenges of
Instructed
Code Editing?
⚡
JIT Exploitation
arxiv.org
·
1d
ClawGym
: A
Scalable
Framework for Building Effective Claw Agents
⚡
JIT Exploitation
arxiv.org
·
19h
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
🐧
Kernel Exploitation
arxiv.org
·
2d
On Benchmark Hacking in
ML
Contests
: Modeling, Insights and Design
💾
Binary Analysis
arxiv.org
·
3d
A Multi-Level
Integrity
Evaluation Framework for Quantum
Circuits
under Controlled Anomaly Injection
🔌
Hardware Security
arxiv.org
·
19h
Optimally
Auditing
Adversarial Agents
🛡️
Exploit Mitigations
arxiv.org
·
1d
Which Face and Whose Identity? Solving the Dual Challenge of Deepfake
Proactive
Forensics
in Multi-Face Scenarios
🧩
Intermediate Representation
arxiv.org
·
19h
Medoid
Prototype Alignment for Cross-Plant
Unknown
Attack Detection in Industrial Control Systems
📟
Firmware Analysis
arxiv.org
·
1d
DryRUN
: On the Role of Public
Tests
in LLM-Driven Code Generation
⚡
JIT Exploitation
arxiv.org
·
6d
Fuelling fusion
plasmas
with
pellets
: Can neuromorphic control outperform Sigma-Delta modulation?
🎲
Fuzzing
arxiv.org
·
19h
Do Synthetic
Trajectories
Reflect
Real Reward Hacking? A Systematic Study on Monitoring In-the-Wild Hacking in Code Generation
🎯
Taint Analysis
arxiv.org
·
2d
Budget-Constrained Causal
Bandits
: Bridging
Uplift
Modeling and Sequential Decision-Making
🔣
Type Systems
arxiv.org
·
19h
Residual
Risk Analysis in
Benign
Code: How Far Are We? A Multi-Model Semantic and Structural Similarity Approach
🔄
Reverse Engineering
arxiv.org
·
6d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help