Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Buffer Overflow, Shellcode, CTF, Reverse Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
104653
posts in
3.71
s
Get the
Gartner
®
CISO
Playbook for Commercial Software Risk: 3 key insights
reversinglabs.com
·
17h
⚖️
Risk Management
The Hidden Risks in Modern
Applications
and How to
Protect
Against Them
theaisurf.com
·
15h
🔒
Security
Safe Yolo Mode: Running LLM Agents in VMs with
Libvirt
and
Virsh
metachris.dev
·
1d
🎆
Firecracker
Introducing new token
formats
and secret
scanning
vercel.com
·
1d
🔒
Security
How to
rescue
a "
broken
" Linux PC from the command line
howtogeek.com
·
1d
🐧
Linux
Writing a
ledger-cli
Language Server
Protocol
with claude
frdmtoplay.com
·
2d
💼
Thrift
Malware Hidden in
Pirated
Games
Infects
400,000 Devices
pcmag.com
·
4d
·
Discuss:
r/Piracy
🔐
Hardware Security
Awesome
OSINT
For “Everything” Part 1
osintteam.blog
·
14h
📝
NLP
The Silent Leak: How URL
Previews
in LLM-Powered Tools Are Quietly
Exfiltrating
Sensitive Data
webpronews.com
·
18h
🛡️
AI Security
From Ransomware to
Residency
: Inside the Rise of the Digital
Parasite
thehackernews.com
·
17h
🦠
Malware Analysis
I
solved
150+ problems and
forgot
most of them. Here's the system I built to fix that.
chromewebstore.google.com
·
17h
·
Discuss:
DEV
📚
Technical Writing
Frequently
Asked
Questions
modules.readthedocs.io
·
1d
🐚
Shell Scripting
How I caught and
punished
my Substack
impersonator
💥
marketingideas.com
·
3d
⚡
X-Fast Tries
Building a Zero-Allocation,
SIMD-Accelerated
CSV
Parser
in Zig
peymanmo.com
·
1d
·
Discuss:
Hacker News
📊
Vectorized Query Execution
How to Prove the
Correctness
of AI-Generated Code Using
Formal
Methods
adacore.com
·
17h
·
Discuss:
Hacker News
🎭
Program Synthesis
SEMA
: Simple yet Effective Learning for Multi-Turn
Jailbreak
Attacks
arxiv.org
·
2d
🏷️
Memory Tagging
ComPass
: Contrastive Learning for Automated Patch
Correctness
Assessment in Program Repair
arxiv.org
·
1d
🧬
Mutation Testing
Lazy-pulling containers: 65x faster pulls, but 20x
slower
readiness
blog.zmalik.dev
·
2d
·
Discuss:
Hacker News
🌊
Glommio
Roll with Advantage:
Hacking
Lenovo
Vantage
mkiesel.ch
·
1d
·
Discuss:
Hacker News
🔐
Hardware Security
Building an
Encryption
System: A Technical Deep
Dive
dev.to
·
4d
·
Discuss:
DEV
🔢
Homomorphic Encryption
Loading...
Loading more...
« Page 17
•
Page 19 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help