Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🐛 Fuzzing
Specific
Security Testing, Random Inputs, Crash Detection, AFL
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
146638
posts in
11.9
ms
Fuzzing LLMs Like
Binaries
: Building a Coverage-Guided Prompt
Fuzzer
in Rust
🐛
Fuzz Testing
medium.com
·
2d
Improving Random Testing via LLM-powered UI
Tarpit
Escaping
for Mobile Apps
🐛
Fuzz Testing
arxiv.org
·
4h
Fuzzing the
Unfuzzable
: Securing LLM Applications with
PromptFuzz
🐛
Fuzz Testing
medium.com
·
3d
Linux's Second-In-Command Turns To New
Fuzzing
Tools For
Uncovering
Kernel Bugs
🐛
Fuzz Testing
phoronix.com
·
1d
·
r/linux
How to
Stub
LLMs for AI Agent Security Testing and
Governance
🎲
Property-Based Testing
tigera.io
·
6d
✂️ Cut your
QA
cycles
down to minutes with automated testing (Sponsor)
✅
Quality Assurance
qawolf.com
·
2d
What Anthropic
Glasswing
reveals about the future of
vulnerability
discovery
🔵
Blue-Green Deployment
csoonline.com
·
1d
Left Security Testing (
DevSecQA
)
🧬
Mutation Testing
medium.com
·
3d
Software Testing Built Itself Into a
Corner
.
Intent-Driven
Testing is the Way Out.
🔴
Test-Driven Development
saucelabs.com
·
3d
Guiding
Symbolic
Execution with Static Analysis and LLMs for Vulnerability Discovery
🎲
Property-Based Testing
arxiv.org
·
4h
Multi-modal
user
interface
control detection using cross-attention
📐
Gini Coefficient
arxiv.org
·
4h
Triggering and Detecting
Exploitable
Library Vulnerability from the Client by Directed
Greybox
Fuzzing
🐛
Fuzz Testing
arxiv.org
·
2d
FLARE
: Agentic Coverage-Guided
Fuzzing
for LLM-Based Multi-Agent Systems
🎲
Property-Based Testing
arxiv.org
·
1d
ABTest
:
Behavior-Driven
Testing for AI Coding Agents
🎲
Property-Based Testing
arxiv.org
·
2d
Fuzzing
REST APIs in Industry:
Necessary
Features and Open Problems
🐛
Fuzz Testing
arxiv.org
·
6d
·
r/programming
CREBench
: Evaluating Large Language Models in
Cryptographic
Binary Reverse Engineering
📦
Aeson
arxiv.org
·
2d
A Multi-Agent Framework for Automated Exploit Generation with
Constraint-Guided
Comprehension
and Reflection
📝
Contract Testing
arxiv.org
·
1d
Contextualizing
Sink
Knowledge for Java Vulnerability Discovery
🎲
Property-Based Testing
arxiv.org
·
6d
Content
Fuzzing
for Escaping Information
Cocoons
on Digital Social Media
💾
information theory
arxiv.org
·
1d
BugForge
: Constructing and Utilizing
DBMS
Bug Repository to Enhance
DBMS
Testing
🧬
Mutation Testing
arxiv.org
·
3d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help