Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💣 Binary Exploitation
Buffer Overflow, ROP, Shellcode, Memory Corruption
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
112494
posts in
498.6
ms
crashing
to
desktop
.
pastebin.com
·
2h
·
Discuss:
r/skyrimmods
💻
programming
Cryptopals-57
solution
dev.to
·
5h
·
Discuss:
DEV
λ
Functional Programming
Researchers
unearth
30-year-old vulnerability in
libpng
library
csoonline.com
·
2h
⏱️
Computational Complexity
CVE-2026-20700: Apple Multiple
Buffer
Overflow
Vulnerability
dev.to
·
22h
·
Discuss:
DEV
🔬
Static Analysis
How
ClickFix
Opens the Door to Stealthy
StealC
Information Stealer
levelblue.com
·
1d
💻
programming
BinaryAudit
: Can AI find
backdoors
in raw machine code?
quesma.com
·
5h
·
Discuss:
Hacker News
⏱️
Computational Complexity
RUSTSEC-2026-0011
: Vulnerability in
polymarket-client-sdks
rustsec.org
·
8h
🔬
Static Analysis
[CVE-2026-25598] Bypassing
Outbound
Connections Detection in
harden-runner
devansh.bearblog.dev
·
2d
🔬
Static Analysis
The
GNU
C
Compiler
Breaks Security
i-programmer.info
·
2d
💻
programming
Creating
massively
huge fake files and
binaries
fzakaria.com
·
1d
·
Discuss:
Hacker News
⏱️
Computational Complexity
pmarreck/validate
: a full binary file format validator for over 100 (EDIT: now around 150) different
filetypes
, written in Zig with frontier AI assistance
github.com
·
1d
🔬
Static Analysis
A
stack-buffer-overflow
exercise with
AddressSanitizer
and PostgreSQL
enterprisedb.com
·
18h
·
Discuss:
Lobsters
,
Hacker News
💻
programming
Proving
Grounds
Fired Linux Lab ( ROAD TO
OSCP
)
infosecwriteups.com
·
13h
💻
programming
Tracing a threat actor's
footprints
on
Tor
sprocketsecurity.com
·
55m
·
Discuss:
Hacker News
⏱️
Computational Complexity
Crash
Log
Help
pastebin.com
·
11h
·
Discuss:
r/skyrimmods
🔬
Static Analysis
Transferable
Backdoor Attacks for Code Models via
Sharpness-Aware
Adversarial Perturbation
arxiv.org
·
15h
λ
Functional Programming
evidence of a malicious actor’s having
exploited
DVS
Democracy Suite
threadreaderapp.com
·
57m
λ
Functional Programming
The game is over: when “free” comes at too high a price. What we know about
RenEngine
securelist.com
·
2d
💻
programming
Daily
Hacker
News for 2026-02-12
daemonology.net
·
20h
💻
programming
The
Impatient
Programmer's Guide to
Bevy
and Rust: Build a 2D Game from Scratch
aibodh.com
·
1h
·
Discuss:
Hacker News
🔬
Static Analysis
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help