Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Buffer Overflow, Shellcode, CTF, Reverse Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
122280
posts in
34.8
ms
BSidesSF
2026:
rugdoctor
- a broken JIT compiler pwn challenge
🦀
Rust Macros
skullsecurity.org
·
2d
·
…
x64-windows-exploitation-series/Buffer
Overflow Guide at main ·
MirraLis/x64-windows-exploitation-series
🔒
Intel MPX
github.com
·
17h
·
DEV
·
…
Hackers No Hashing:
Randomizing
API Hashes to Evade Cobalt Strike
Shellcode
Detection
#️⃣
Perfect Hashing
huntress.com
·
3d
·
…
Exploiting a 32-year-old
buffer
overflow in GNU
telnetd
(CVE-2026-32746)
🔍
Linux BPF
striga.ai
·
1d
·
Hacker News
·
…
VulnCorp
CTF by
INE
: The Moment I Wanted to Quit, But I Didn’t
📝
Write-Ahead Logging
infosecwriteups.com
·
3d
·
…
Container Transforms: Working with
Nested
Binary
Formats
📦
Binary Formats
binary.ninja
·
1d
·
…
Polygon Bridge
Arbitrary
Message
Forging
Using Memory Corruption
🔺
Delta Lake
hexens.io
·
2d
·
Hacker News
·
…
OSINT.UK
Community
CTF
Write-Up: Challenge 12
🦠
Malware Analysis
medium.com
·
3d
·
…
Reverse
Engineering Claude Code's 2026 April
Fools
📦
Folly
variety.is
·
2d
·
Hacker News
·
…
What's
cch
? Reverse Engineering Claude Code's Request
Signing
⚡
xxHash
a10k.co
·
1d
·
Hacker News
,
r/programming
·
…
ELA-1666-1
libvpx
security update
🦅
Falco
freexian.com
·
5d
·
…
MythX
: An EndGame
PR0T0C0L
-Full CTF Writeup
🔒
Tetragon
medium.com
·
2d
·
…
Disguising
Topology and Side-Channel Information through Covert Gate- and ML-Enabled IP
Camouflaging
🔐
Hardware Security
arxiv.org
·
3d
·
…
Reverse Engineering
Crazy
Taxi
, Part 2
💾
Retro Computing
wretched.computer
·
2d
·
Hacker News
·
…
miscusi-peek/cheatengine-mcp-bridge
: Connect Cursor, Copilot & Claude AI directly to Cheat Engine via MCP. Automate reverse engineering, pointer scanning, and memory analysis using natural language.
🧩
mimalloc
github.com
·
11h
·
…
BSidesSF
2026: read(write(call))me - progressive
pwn
challenges
🏷️
Memory Tagging
skullsecurity.org
·
2d
·
…
Understanding Evil: How to
Reverse
Engineer
Malware
🔍
Reverse Engineering
huntress.com
·
3d
·
…
Assessment
Methodologies
: Vulnerability Assessment
CTF-1
📝
Write-Ahead Logging
infosecwriteups.com
·
6d
·
…
Critical Vulnerability:
WebP
Heap
Buffer Overflow (CVE-2023-4863)
🔍
eBPF Verifier
huntress.com
·
3d
·
…
Deobfuscating
Files for Flags:
Huntress
CTF 2025 Retro
🦅
Falco
huntress.com
·
3d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help