Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Buffer Overflow, Shellcode, CTF, Reverse Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
122097
posts in
91.5
ms
Binary Heaven — Reverse Engineering Go
Binaries
,
ret2libc
Buffer Overflow, and PATH Hijack to Root…
🛡️
AMD SEV
infosecwriteups.com
·
2d
UMASSCTF
2026. Factory Monitor [
pwn
]
🐚
Shell Scripting
blogs.tunelko.com
·
7h
V8 Exploitation: From
Libc
Pwn
to Browser Bugs
🐧
Rust for Linux
varik.dev
·
3d
·
Hacker News
CVE-2026-5190 - AWS C Event Stream Streaming
Decoder
Stack
Buffer
Overflow
📡
AF_PACKET
aws.amazon.com
·
2h
Lean
proved
this program was correct; then I found a bug.
🔬
Miri
kirancodes.me
·
1d
·
Lobsters
,
Hacker News
,
Hacker News
,
r/programming
New
Rowhammer
Attacks on NVIDIA GPUs
Enable
Full System Takeover
🏷️
Memory Tagging
infoq.com
·
7h
Can LLMs
Deobfuscate
Binary Code? A Systematic Analysis of Large Language Models into
Pseudocode
Deobfuscation
👻
Phantom Types
arxiv.org
·
4d
Reverse engineering
Crazy
Taxi
🔍
Reverse Engineering
blog.adafruit.com
·
21h
Sentinel-Based
Code Tracing via Runtime Code Section
Patching
🔍
eBPF
revers.engineering
·
1d
·
Hacker News
Reverse
Engineering
Tuya
with AI
🦙
Ollama
zach.codes
·
2h
·
Hacker News
ZeroSecure
CTF
2026
🦅
Falco
ctftime.org
·
1d
Reverse Engineering a Multi Stage File Format Steganography Chain of the
TeamPCP
Telnyx
Campaign
📦
Binary Formats
husseinmuhaisen.com
·
3d
·
Hacker News
,
r/netsec
Between Two
Nerds
: How AI will
upset
state cyber competition
🛡️
AI Security
risky.biz
·
22h
Operation
Carbonado
(UK
OSINT
CTF Challenge): How I Solved a Multi-Stage
OSINT
Investigation
🔭
Tracing
medium.com
·
1d
Oakmark
Fund Picks
Roper
Technologies (ROP) on Varied Growth Drivers
💰
TigerBeetle
finance.yahoo.com
·
5h
aloshdenny/reverse-SynthID
: reverse engineering Gemini's
SynthID
detection
👆
Fingerprinting
github.com
·
4d
·
Hacker News
Reversing.Works
🔍
Reverse Engineering
reversing.works
·
2d
How to Run a
CTF
That People Actually Learn From (Not Just
Compete
In)
📝
Write-Ahead Logging
simulationslabs.com
·
2d
·
DEV
Reverse
Engineering
VARA
FM Part 1 - Connection Request
🥑
Avro
themodernham.com
·
5d
Our evaluation of Claude
Mythos
Preview’s cyber
capabilities
🔒
Security
aisi.gov.uk
·
1d
·
Lobsters
,
Hacker News
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help