Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
16819
posts in
252.3
ms
OMG
, After a Decade,
VXLAN
Is Still Insecure
blog.ipspace.net
Β·
6d
π£οΈ
BGP Hijacking
TruConfirm
: Ending Vulnerability Guesswork with Proof inside
ETM
blog.qualys.com
Β·
5d
β
Archive Fixity
Did a
renowned
hacker help Jeffrey Epstein get β
dirt
on other peopleβ?
san.com
Β·
6d
Β·
Discuss:
Hacker News
π
Indie Hacking
Firesheep
: Easy HTTP session
hijacking
from within Firefox (2010)
codebutler.com
Β·
4d
Β·
Discuss:
Hacker News
π
Password Cracking
The Port 19
Chargen
Amplification
Attack on Financial Institutions (2013)
connected.app
Β·
6d
Β·
Discuss:
Hacker News
π‘
Protocol Forensics
EvilBit-Labs/opnDossier
: Generate meaninigful output from your opnSense configuration file, inspired by TKCERT/pfFocus
github.com
Β·
4d
Β·
Discuss:
r/homelab
π
eBPF
stdlib
v7.2
erlang.org
Β·
4d
Β·
Discuss:
Hacker News
π¦
Rusty Databases
New Research from
UpGuard
: 1 in 5 Developers Grant AI Vibe Coding Tools
Unrestricted
Workstation Access
upguard.com
Β·
5d
Β·
Discuss:
Hacker News
π‘οΈ
WebAssembly Security
When Vibe
Coded
Consumer Agents Go
Rogue
nearfuturelaboratory.com
Β·
6d
Β·
Discuss:
Hacker News
π
Home Automation
Trojan
Attacks on Neural Network
Controllers
for Robotic Systems
arxiv.org
Β·
4d
π
Homelab Pentesting
Mastering Legacy Code:
Bypassing
Gated
Content with Python
dev.to
Β·
5d
Β·
Discuss:
DEV
π‘οΈ
WASM Security
Russian space vehicles are
tapping
comms
from key European satellites, report
metacurity.com
Β·
5d
π«
Kerberos Exploitation
Reading Between the Code
Lines
: On the Use of
Self-Admitted
Technical Debt for Security Analysis
arxiv.org
Β·
6d
π
Code Metrics
I
Haven
't
Written
Code by Hand for a Year. And I'm Not Going Back.
dev.to
Β·
3d
Β·
Discuss:
DEV
β‘
Proof Automation
The security implementation gap: Why Microsoft is
supporting
Operation Winter
SHIELD
microsoft.com
Β·
4d
π
Systems Hardening
Betterment
breach may expose
1.4M
users after social engineering attack
theregister.com
Β·
4d
π«
Kerberos Attacks
By whatever name β
Moltbot
,
Clawd
, OpenClaw β this uber AI assistant is a security nightmare
computerworld.com
Β·
6d
Β·
Discuss:
Hacker News
π
Indie Hacking
What Is an Advanced
Persistent
Threat
securityscorecard.com
Β·
6d
π―
Threat Hunting
5 Key
Takeaways
from The New Era of
Phishing
: Threats Built in the Age of AI
cofense.com
Β·
9h
π―
Threat Hunting
Top 10 web
hacking
techniques
of 2025
portswigger.net
Β·
4d
π
BGP Security
Loading...
Loading more...
« Page 14
β’
Page 16 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help