Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Buffer Overflow, Shellcode, CTF, Reverse Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
635
posts in
7.3
ms
Vulnerability
Research Is
Cooked
🛡️
Security Research
simonwillison.net
·
6d
Part II — Third-party
libraries
: the vulnerability layer nobody
counted
🔍
Reverse Engineering
securesql.info
·
18h
Security through
chaos
⚙️
Systems Programming
phpunit.expert
·
2d
MindDump
🔍
Reverse Engineering
kuber.studio
·
17h
Observations
on blocking various
webbots
🌐
WebAssembly
boston.conman.org
·
2d
AI agents found
vulns
in this popular Linux and
Unix
print server
🔧
Unix Tools
theregister.com
·
3d
Fedora
44: Best New Features
💻
Terminal Emulators
debugpoint.com
·
1d
Why your files are
slowly
dying
💾
Vintage Computing
behindtheviewfinder.com
·
3d
The Building Block Economy
🌐
Open Source
mitchellh.com
·
3d
·
Lobsters
,
Hacker News
The iPhone
Exploit
Kit Is on GitHub Now. We Warned You About AI
Tooling
. The Weapons Are Following.
🛡️
Security Research
dugganusa.com
·
3d
Part III — When the security scanner became the weapon:
Trivy
→
LiteLLM
→ Axios
🦠
Malware Analysis
securesql.info
·
16h
Container smoke testing with
Goss
: stop guessing if your
.env
works
✅
Pytest
blog.zolty.systems
·
4d
Anthropic’s Project
Glasswing
—restricting Claude
Mythos
to security researchers—sounds necessary to me
🛡️
Security Research
simonwillison.net
·
2d
·
Hacker News
Months-old
Adobe
Reader zero-day uses
PDFs
to size up targets
⌨️
Text Editors
theregister.com
·
18h
The
Borrowed
Cloud
🌐
Open Source
sloppish.com
·
4d
PKLITE
supplement 6: Min/max
alloc
., part 1
⚙️
Systems Programming
entropymine.wordpress.com
·
4d
Vulnerability Research Isn’t
Cooked
; It’s
Burned
Beyond Recognition
🛡️
Security Research
jericho.blog
·
3d
Speeding Up
IAMTrail
: One Boto3 Process Instead of 1,500 CLI
Invocations
📦
UV Package Manager
zoph.me
·
6d
Part I — The original
quantitative
case: internet infrastructure is not
OK
🛡️
Security Research
securesql.info
·
1d
Exposing
an Agentic
Pipeline
as an MCP Server
🔌
LSP Protocol
walsenburgtech.com
·
3d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help