Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🐍 Hacking, automation, python, black hat hacking
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
150687
posts in
22.1
ms
OffSec
’s
Exploit
Database Archive
🌐
Web Exploits
exploit-db.com
·
2d
The One Thing Most Python
Tutorials
Won’t
Teach
You
🏴
Hacking, black hat
medium.com
·
5d
Simplifying
Python Security: A Local-First Approach with
WASM
💣
Metasploit
nocomplexity.com
·
3h
How I Used
OSINT
to
Gather
Information Like a Hacker
🕵️
OSINT
osintteam.blog
·
11h
Marimo
OSS Python Notebook
RCE
: From Disclosure to Exploitation in Under 10 Hours
💣
Metasploit
webflow.sysdig.com
·
1d
Blind SQL Injection with
Conditional
Responses
🌐
Web Exploits
medium.com
·
11h
Mr. Robot Hacking
Wiki
- Complete Technical
Reference
🦈
Wireshark
joasantonio.com
·
5d
I Got Tired of Running 15 Different
Nmap
Commands. So I Built My Own Vulnerability
Scanner
.
🦈
Wireshark
medium.com
·
20h
Show HN:
BrokenClaw
Part 5: GPT-5.4 Edition (Prompt
Injection
)
🏴
Hacking, black hat
veganmosfet.codeberg.page
·
2d
·
Hacker News
Mastering
Metasploit
Framework — From Zero to Controlled
Exploitation
(Beginner → Operator)
💣
Metasploit
medium.com
·
17h
From
bytecode
to bytes: automated magic
packet
generation
💣
Metasploit
blog.cloudflare.com
·
2d
·
Hacker News
Bypassing SSRF
Blacklists
: A Walkthrough of
PortSwigger
’s Practitioner Lab
💣
Metasploit
medium.com
·
3d
Giving
an Agent a
Rooted
Android Phone
💣
Metasploit
workers.io
·
20h
·
Hacker News
Autonomous
AI
Penetration
Testing
💣
Metasploit
llmtary.com
·
1d
·
Hacker News
Abusing
BYOVD
for Process Injection into Protected Processes (
PPL
)
⚙️
Assembly
medium.com
·
18h
What is
Ethical
Hacking
? A Beginner-Friendly Guide (2026)
🎯
Penetration Testing
medium.com
·
5d
Z4nzu/hackingtool
: ALL IN ONE Hacking Tool For Hackers
💣
Metasploit
github.com
·
2d
TCS
HackQuest
Season 10 Experience
🚩
CTF
medium.com
·
2d
What Are
Adversaries
Doing? Automating Tactics, Techniques, and
Procedures
Extraction: A Systematic Review
🕵️
OSINT
arxiv.org
·
4d
Your AI Agent Is a Security
Nightmare
. Here’s What I Do About It.
💣
Metasploit
pub.towardsai.net
·
1d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help