Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💥 Binary Exploitation
Specific
buffer overflow, ROP chains, pwn, exploit development
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
16697
posts in
32.6
ms
x64-windows-exploitation-series/Buffer
Overflow Guide at main ·
MirraLis/x64-windows-exploitation-series
🐛
WinDbg
github.com
·
5d
·
DEV
·
…
Vulnerability
Research Is
Cooked
🔓
Vulnerability Research
simonwillison.net
·
2d
·
…
Reverse Engineering
Cloudflare
's React-Based
Bot
Detection in 2026
📰
Feed Readers
vhubster3.gumroad.com
·
3d
·
DEV
·
…
Letsdefend
Walkthrough: Reverse Engineering a P2P Malware
DLL
🦠
Malware
danyelpaius.medium.com
·
3d
·
…
A SOC Threat Intelligence Investigation.
TryHackMe
First Shift
CTF
— Task 3: Probably Just Fine
🚩
CTF
medium.com
·
4d
·
…
AI coding agents will
drastically
alter
both the practice and the economics of exploit development, automating the discovery of zero-day vulnerabilities (Thomas...
🐛
Vulnerability Markets
techmeme.com
·
6d
·
…
How to Check Polish Company Insolvency
Programmatically
(
KRZ
Scraper)
🔍
eBPF
dev.to
·
6d
·
DEV
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help