Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💣 Binary Exploitation
Buffer Overflow, ROP, Shellcode, Memory Corruption
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
112853
posts in
412.6
ms
CVE-2026-20700: Apple Multiple
Buffer
Overflow
Vulnerability
dev.to
·
1d
·
Discuss:
DEV
🔬
Static Analysis
When Trying to Catch
Cheaters
Breaks the
MPC
(Full Version)
eprint.iacr.org
·
2d
🏗️
Design Patterns
.NET
Checker
1.5
majorgeeks.com
·
14h
🔬
Static Analysis
I'm Building a Tower Defense Game Where
VCs
Are the
Enemy
hackernoon.com
·
12h
💻
programming
Rcarmo/go-te
: A terminal
emulation
library for Go
github.com
·
4h
·
Discuss:
Hacker News
💻
programming
Tracing a threat actor's
footprints
on
Tor
sprocketsecurity.com
·
18h
·
Discuss:
Hacker News
,
r/privacy
⏱️
Computational Complexity
Crash
Log
Help
pastebin.com
·
1d
·
Discuss:
r/skyrimmods
🔬
Static Analysis
Transferable
Backdoor Attacks for Code Models via
Sharpness-Aware
Adversarial Perturbation
arxiv.org
·
1d
λ
Functional Programming
When Hospitality Software is Too
Hospitable
(
CVE-2026-21966
,
CVE-2026-21967
)
trebledj.me
·
1d
💻
programming
evidence of a malicious actor’s having
exploited
DVS
Democracy Suite
threadreaderapp.com
·
18h
λ
Functional Programming
AgentRE-Bench
: Can LLM Agents Reverse Engineer Malware?
agentre-bench.ai
·
11h
·
Discuss:
Hacker News
λ
Functional Programming
The game is over: when “free” comes at too high a price. What we know about
RenEngine
securelist.com
·
3d
💻
programming
How to
Destroy
a Hard Drive
Securely
techservicetoday.com
·
19m
λ
Functional Programming
Txtbrd
txtbrd.com
·
17h
·
Discuss:
Hacker News
💻
programming
CVE-2026-26249: The Ghost in the Machine:
Anatomy
of the
Rejected
CVE-2026-26249
dev.to
·
1d
·
Discuss:
DEV
💻
programming
If Nobody
Reads
Code, Why Not Write in Assembly? So Here's
Redis
in Assembly
aydinnyunus.github.io
·
19h
·
Discuss:
Hacker News
🔬
Static Analysis
Unzipping
the Threat: How to Block Malware Hidden in Password-Protected
ZIP
Files
blog.checkpoint.com
·
1d
🔁
Recursion
How we
allowed
remote code execution (but
safely
)
tumuchdata.club
·
20h
·
Discuss:
Lobsters
,
Hacker News
💻
programming
Hiding
information inside images
nullonerror.org
·
1d
·
Discuss:
Hacker News
💻
programming
Four new reasons why Windows
LNK
files cannot be
trusted
csoonline.com
·
22h
💻
programming
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help