Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💣 Binary Exploitation
Buffer Overflow, ROP, Shellcode, Memory Corruption
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
113402
posts in
610.3
ms
libcudadebugger.so
logger
redplait.blogspot.com
·
16h
·
Discuss:
redplait.blogspot.com
🔬
Static Analysis
I let Claude Code with 150 offensive security MCP tools
loose
on my
homelab
credrelay.com
·
1d
·
Discuss:
Hacker News
λ
Functional Programming
Technical "
whitepaper
" for
afl-fuzz
lcamtuf.coredump.cx
·
13h
·
Discuss:
Lobsters
🔬
Static Analysis
Fortnite adds more anti-cheat requirements, including Secure Boot and
TPM
, so it might be time to get
tinkering
in that BIOS
pcgamer.com
·
15h
🔬
Static Analysis
The "secret" Python switch: How one
flag
makes your
scripts
run faster
howtogeek.com
·
1d
💻
programming
Review
waytoomany.games
·
6h
🔢
mathmemathics
Prompt
Injection
: The #1 AI Security Threat Every Developer Must
Understand
pub.towardsai.net
·
11m
λ
Functional Programming
Markdown.exe
idiallo.com
·
1d
🔬
Static Analysis
Microsoft: New Windows
LNK
spoofing
issues aren't vulnerabilities
bleepingcomputer.com
·
7h
💻
programming
Risky Bulletin:
IcedID
malware developer
fakes
his own death to escape the FBI
risky.biz
·
2h
💻
programming
RUSTSEC-2025-0151
: Vulnerability in
sha-rst
rustsec.org
·
22h
λ
Functional Programming
Helpful Skills or Hidden
Payloads
?
Bitdefender
Labs Dives Deep into the OpenClaw Malicious Skill Trap
bitdefender.com
·
14h
λ
Functional Programming
Capture the
Kerberos
Flag: Detecting
Kerberos
Anomalies
blog.nviso.eu
·
19h
⏱️
Computational Complexity
The Many
Flavors
of
Ignore
Files
nesbitt.io
·
18h
·
Discuss:
Hacker News
🔬
Static Analysis
Solarwinds
WHD
flaws exploited in attacks targeting servers and credentials
techradar.com
·
2d
🌳
Red-Black Trees
Four Seconds to Botnet - Analyzing a Self
Propagating
SSH Worm with
Cryptographically
Signed C2 [Guest Diary], (Wed, Feb 11th)
isc.sans.edu
·
1d
λ
Functional Programming
Zprime137/iZprime
:
iZprime
, a study on algorithmic prime generation
github.com
·
7h
·
Discuss:
r/C_Programming
⚙
algorithms
Cross Compiling
CGO
with
Dagger
and Zig
johncodes.com
·
16h
·
Discuss:
Hacker News
💻
programming
bpftrace
in C++
kuniga.me
·
3d
λ
Functional Programming
Building a Virtual
Ethical
Hacking Home Lab — Part 6: System
Exploitation
infosecwriteups.com
·
22h
⏱️
Computational Complexity
Sign up or log in to see more results
Sign Up
Login
« Page 2
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help