Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Buffer Overflow, Shellcode, CTF, Reverse Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186670
posts in
31.3
ms
ShellForge
: Building a Constraint-Aware
Shellcode
Generator from Scratch
⚙️
Compiler Design
infosecwriteups.com
·
1d
How I Broke the Anti-Bot Behind
Nike
, Kick, and
Twitch
🔍
Reverse Engineering
emro.cat
·
3d
·
Lobsters
,
Hacker News
Reverse
Engineering & Hardware
Hacking
🔍
Reverse Engineering
malware.news
·
6h
OffSec
’s
Exploit
Database Archive
🛡️
Security Research
exploit-db.com
·
2d
Footprinting
and Scanning CTF Walkthrough: Reconnaissance Using
Nmap
& Web Enumeration
🔒
Cybersecurity
medium.com
·
16h
Adversarial Malware Generation in Linux ELF
Binaries
via Semantic-Preserving
Transformations
🦠
Malware Analysis
arxiv.org
·
4d
Wiz Finds GitHub RCE 🐙,
DPRK
AI Targets Devs 🕵️, OWASP
FinBot
CTF Live 🤖
🛡️
Security Research
tldr.tech
·
1d
Reverse
Engineering the New Middle East: West Asia and the U.S.-Israel-Iran War
🎯
Defense Industry
americanaffairsjournal.org
·
9h
Reverse
Engineering
SimTower
🔍
Reverse Engineering
phulin.me
·
1d
·
Hacker News
,
r/programming
Reverse
Engineering
Stunt
Island with LLM
🔍
Reverse Engineering
marnetto.net
·
3d
·
Hacker News
FreeBSD
Security Advisory
FreeBSD-SA-26
:
15.dhclient
⚙️
Systems Programming
discoverbsd.com
·
1d
Reverse Engineering With AI
Unearths
High-Severity
GitHub Bug (4 minute read)
🔍
Reverse Engineering
darkreading.com
·
1d
OSINT
Industries
CTF
Write Ups
🎖
Military
medium.com
·
5d
ELA-1699-1
ffmpeg
security update (by )
🛡️
Security Research
freexian.com
·
2d
Friday Overtime |
TryHackMe-CTF
📈
Sports Statistics
medium.com
·
5d
FinBot
CTF Is Live: A Hands-On Companion to the
OWASP
GenAI Security Project
🔌
LSP Protocol
genai.owasp.org
·
2d
Cerberus
Anti-theft is
stalkerware
: a reverse engineering
🦠
Malware Analysis
hexproof.dev
·
1d
·
Hacker News
Reverse engineering
Adobe
’s
gamut
mapping
👁️
Computer Vision
blog.kasson.com
·
3d
UMD
CTF
2026
🔒
Cybersecurity
nukeofficial.medium.com
·
1d
Vibe Security
CTF
: The Triple Threat
Walkthrough
🛡️
Security Research
medium.com
·
4d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help