Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Buffer Overflow, Shellcode, CTF, Reverse Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
573
posts in
6.7
ms
Vulnerability
Research Is
Cooked
🛡️
Security Research
simonwillison.net
·
6d
Part II — Third-party
libraries
: the vulnerability layer nobody
counted
🔍
Reverse Engineering
securesql.info
·
20h
Security through
chaos
⚙️
Systems Programming
phpunit.expert
·
2d
Months-old
Adobe
Reader zero-day uses
PDFs
to size up targets
⌨️
Text Editors
theregister.com
·
20h
Observations
on blocking various
webbots
🌐
WebAssembly
boston.conman.org
·
2d
Why your files are
slowly
dying
💾
Vintage Computing
behindtheviewfinder.com
·
3d
MindDump
🔍
Reverse Engineering
kuber.studio
·
19h
Fedora
44: Best New Features
💻
Terminal Emulators
debugpoint.com
·
1d
Shipyard
is a cross-platform CI orchestration layer that coordinates validation for AI agents working across parallel
worktrees
⚙️
Systems Programming
danielraffel.me
·
1d
The Building Block Economy
🌐
Open Source
mitchellh.com
·
3d
·
Lobsters
,
Hacker News
The iPhone
Exploit
Kit Is on GitHub Now. We Warned You About AI
Tooling
. The Weapons Are Following.
🛡️
Security Research
dugganusa.com
·
3d
The
Borrowed
Cloud
🌐
Open Source
sloppish.com
·
4d
Part III — When the security scanner became the weapon:
Trivy
→
LiteLLM
→ Axios
🦠
Malware Analysis
securesql.info
·
18h
Container smoke testing with
Goss
: stop guessing if your
.env
works
✅
Pytest
blog.zolty.systems
·
4d
Security researchers
tricked
Apple Intelligence into
cursing
at users. It could have been a lot worse
🔍
Reverse Engineering
theregister.com
·
22h
Anthropic’s Project
Glasswing
—restricting Claude
Mythos
to security researchers—sounds necessary to me
🛡️
Security Research
simonwillison.net
·
2d
·
Hacker News
PKLITE
supplement 6: Min/max
alloc
., part 1
⚙️
Systems Programming
entropymine.wordpress.com
·
4d
Vulnerability Research Isn’t
Cooked
; It’s
Burned
Beyond Recognition
🛡️
Security Research
jericho.blog
·
3d
Speeding Up
IAMTrail
: One Boto3 Process Instead of 1,500 CLI
Invocations
📦
UV Package Manager
zoph.me
·
6d
Exposing
an Agentic
Pipeline
as an MCP Server
🔌
LSP Protocol
walsenburgtech.com
·
3d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help