Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🚩 CTF
capture the flag, pwn, binary exploitation, CTF writeup
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186325
posts in
19.4
ms
HTB
:
Sorcery
🛡️
Exploit Mitigations
0xdf.gitlab.io
·
5d
OffSec
’s
Exploit
Database Archive
💾
Binary Analysis
exploit-db.com
·
2d
Copy Fail is 732
bytes
. Your
foothold
problem is the bigger one.
🐧
Kernel Exploitation
tarpit.pro
·
22h
·
DEV
Copy Fail: This
Exploit
Gives
Root
Access on Linux
🐧
Kernel Exploitation
youtube.com
·
1h
Impacket
for
Pentester
: Net
💾
Binary Analysis
rajhackingarticles.blogspot.com
·
1d
·
rajhackingarticles.blogspot.com
Show HN:
Capture
the
Flag
game where LLMs are the only players
🛡️
Exploit Mitigations
github.com
·
8h
·
Hacker News
Friday Overtime |
TryHackMe-CTF
🎲
Fuzzing
medium.com
·
5d
Footprinting
and Scanning CTF Walkthrough: Reconnaissance Using
Nmap
& Web Enumeration
🐧
Kernel Exploitation
medium.com
·
16h
Exploiting
Reversing
(ER) series: article 09 | Exploitation Techniques: CVE-2024-30085 (part 03)
🐧
Kernel Exploitation
exploitreversing.com
·
2d
Serious root exploit
affecting
EVERY Linux distribution
shipped
in last 9 years
🐧
Kernel Exploitation
forums.anandtech.com
·
2h
EXPMON
detected sophisticated zero-day
fingerprinting
attack targeting Adobe Reader users
💾
Binary Analysis
justhaifei1.blogspot.com
·
14h
·
Hacker News
Wiz Finds GitHub RCE 🐙,
DPRK
AI Targets Devs 🕵️, OWASP
FinBot
CTF Live 🤖
🛡️
Exploit Mitigations
tldr.tech
·
1d
OSINT
Industries
CTF
Write Ups
🛡️
Exploit Mitigations
medium.com
·
5d
The
732-Byte
Nightmare: Why the “Copy Fail”
Exploit
Changed Linux Security Overnight
🐧
Kernel Exploitation
itmefeez.medium.com
·
16h
‘
Trivial
’ exploit can give
attackers
root access to Linux kernel
🐧
Kernel Exploitation
csoonline.com
·
2h
Copy Fail exploit lets 732
bytes
hijack
Linux systems and quietly grab root
🐧
Kernel Exploitation
nerds.xyz
·
1d
·
r/netsec
Reverse
Engineering & Hardware
Hacking
🔄
Reverse Engineering
malware.news
·
6h
New Linux 'Copy Fail' Vulnerability
Enables
Root Access On Major
Distros
🐧
Kernel Exploitation
it.slashdot.org
·
5h
Vibe Security
CTF
: The Triple Threat
Walkthrough
🎲
Fuzzing
medium.com
·
4d
Attack of the killer
script
kiddies
⚡
JIT Exploitation
oodaloop.com
·
2d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help