Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Buffer Overflow, Shellcode, CTF, Reverse Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186632
posts in
22.3
ms
Long Term Support
Channel
Update for
ChromeOS
🌐
Open Source
chromereleases.googleblog.com
·
1d
·
Blogger
Decoding
Greatness
by Ron
Friedman
, Inside Notion, and more
🐧
Unix Philosophy
wise.readwise.io
·
4d
Reverse engineered
Alienware
16X Aurora fan control on Linux via
ACPI
— full independent CPU/GPU fan speed control working
🔌
Embedded Hardware
github.com
·
3d
·
r/archlinux
Reverse Engineering the
Proscenic
850T
Robot Vacuum
🔍
Reverse Engineering
infosecwriteups.com
·
2d
Roper
Technologies: Solid Q1, I'm
Bullish
Despite The AI Fears (NASDAQ:ROP)
💬
Prompt Engineering
seekingalpha.com
·
4d
When AI Enters the
Arena
: Students
Tackle
Cybersecurity Challenges
🔒
Cybersecurity
news.syr.edu
·
6d
IP Ninja :: Fake PoC, Real Backdoor: How a
Typosquatted
Repo
Weaponized
CVE-2026-31431
🔍
Reverse Engineering
ip-ninja.com
·
20h
·
Hacker News
Copy Fail: New Linux bug
enables
Root
via page‑cache corruption
🛡️
Security Research
securityaffairs.com
·
11h
Linux
Copy
Fail
exploit
🔍
Reverse Engineering
forums.anandtech.com
·
12h
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
🦠
Malware Analysis
arxiv.org
·
3d
ub
_
cancel
(3) Linux Manual Page
⚙️
Systems Programming
systutorials.com
·
9h
CVE-2026-31431
🛡️
Security Research
security-tracker.debian.org
·
2h
Randomness
extractor
🔧
Unix Tools
en.wikipedia.org
·
6h
pwnwriter/seg
: Analyze binaries and generate structured reports for AI agents and security research.
🔍
Reverse Engineering
github.com
·
13h
·
Hacker News
Cve-2026-31431
[
danger
]
📝
Emacs
linuxcommunity.io
·
5h
The
732-Byte
Nightmare: Why the “Copy Fail”
Exploit
Changed Linux Security Overnight
⚙️
Systems Programming
itmefeez.medium.com
·
17h
A guide to Windows
application
development using
w64devkit
💻
Terminal Tools
nullprogram.com
·
11h
The most severe Linux threat to surface in years
catches
the world
flatfooted
🛡️
Security Research
arstechnica.com
·
9h
·
Hacker News
‘Copy Fail’ Logic
Flaw
in Linux Kernel
Enables
System Takeover
⚙️
Systems Programming
securityweek.com
·
19h
Throwing Random Arguments at System
Binaries
: Real
Segfaults
vs. Ticket Noise
🔍
Reverse Engineering
communityblog.fedoraproject.org
·
2d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help