Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Buffer Overflow, Shellcode, CTF, Reverse Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
73219
posts in
242.7
ms
project-copacetic/copacetic
: 🧵 CLI tool for directly
patching
container images!
github.com
·
1d
🔧
Abseil
Identifying
Adversary
Tactics and Techniques in Malware
Binaries
with an LLM Agent
arxiv.org
·
1d
🛡️
AI Security
👻 **
Living
Off The Land
Evasion
**
dev.to
·
1d
·
Discuss:
DEV
🔍
eBPF
BellSoft
Survey Finds Container Security Practices Are
Undermining
Developers’ Own Goals
infoq.com
·
4h
🔐
Capability Systems
Open Source in Focus: .NET Projects and the Tools Behind Them
blog.jetbrains.com
·
9h
🏗️
Pavex
ELA-1642-1
python3.7
security update
freexian.com
·
9h
🦅
Falco
SectorC
: a C compiler in 512
bytes
blog.adafruit.com
·
18h
📏
Picolibc
CVE-2026-1731: Critical Unauthenticated Remote Code Execution in
BeyondTrust
Remote Support (RS) and
Privileged
Remote Access (PRA)
rapid7.com
·
21h
🔒
Tetragon
Sneaky
quokka
: Testing and debugging with LLMs
honnibal.dev
·
7h
✅
Property Testing
Reducing
Technical
Debt: Top Five Coding Resources
loufranco.com
·
1d
🔨
Incremental Compilation
6 tiny programs I use to
solve
annoying
problems
xda-developers.com
·
1d
💻
Terminal Tools
Unlocking core memories with
GoldSrc
engine and
CS
1.6 (2025)
danielbrendel.com
·
2d
·
Discuss:
Hacker News
⚡
ZGC
Linux 7.0 Adds support For
BPF
Filtering To IO_
uring
phoronix.com
·
3h
🔍
Linux BPF
Package-Inferred
Systems are Dangerous
aartaka.me
·
5h
📦
uv
Trying to look at how something's built, and run into another one of these
blasted
scripts
.
intigin.com
·
1d
·
Discuss:
r/javascript
🦅
Falco
Shane
Borden
: Do PostgreSQL Sub-Transactions Hurt Performance?
shaneborden.com
·
37m
🐘
PostgreSQL Internals
AI Code Generation Tools Repeat Security Flaws, Creating
Predictable
Software
Weaknesses
quantumzeitgeist.com
·
1d
🛡️
AI Security
Critlist/protoHack
: Restoring Jay Fenlason's original 1981—1982 Hack to run on modern Linux.
github.com
·
2d
·
Discuss:
Hacker News
💾
Retro Computing
SecureShellClaw
: A Prompt-Injection-Resistant Alternative Approach to
OpenClaw
jona.ca
·
1d
·
Discuss:
Hacker News
🔀
Crossbeam
Retrieval Pivot Attacks in Hybrid RAG: Measuring and Mitigating
Amplified
Leakage
from Vector Seeds to Graph Expansion
arxiv.org
·
11h
🌸
Bloom Filters
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help